cvs-commit at gcc dot gnu.org
2018-05-23 11:28:23 UTC
https://sourceware.org/bugzilla/show_bug.cgi?id=23198
--- Comment #2 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> ---
The master branch has been updated by Pedro Alves <***@sourceware.org>:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=81e25b7c91efcc3ff54605b11859375a5c885c8b
commit 81e25b7c91efcc3ff54605b11859375a5c885c8b
Author: Erik Kurzinger <***@nvidia.com>
Date: Wed May 23 12:04:39 2018 +0100
Improve File I/O overflow detection in gdbserver (PR server/23198)
Currently, the function used by gdbserver to parse integers from
received File I/O commands will detect overflow and fail for any value
over 0xfffffff. Among other things, this has the effect of limiting
the file offsets for reading or writing to about 268MB which can be
insufficient for particularly large libraries.
This change allows the parsing of integers up to the true maximum
positive value of 0x7fffffff, increasing the file size limit to about
2GB.
gdb/gdbserver/ChangeLog:
2018-05-23 Erik Kurzinger <***@nvidia.com>
PR server/23198
* hostio.c (require_int): Do not report overflow for integers
between 0xfffffff and 0x7fffffff.
--- Comment #2 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> ---
The master branch has been updated by Pedro Alves <***@sourceware.org>:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=81e25b7c91efcc3ff54605b11859375a5c885c8b
commit 81e25b7c91efcc3ff54605b11859375a5c885c8b
Author: Erik Kurzinger <***@nvidia.com>
Date: Wed May 23 12:04:39 2018 +0100
Improve File I/O overflow detection in gdbserver (PR server/23198)
Currently, the function used by gdbserver to parse integers from
received File I/O commands will detect overflow and fail for any value
over 0xfffffff. Among other things, this has the effect of limiting
the file offsets for reading or writing to about 268MB which can be
insufficient for particularly large libraries.
This change allows the parsing of integers up to the true maximum
positive value of 0x7fffffff, increasing the file size limit to about
2GB.
gdb/gdbserver/ChangeLog:
2018-05-23 Erik Kurzinger <***@nvidia.com>
PR server/23198
* hostio.c (require_int): Do not report overflow for integers
between 0xfffffff and 0x7fffffff.
--
You are receiving this mail because:
You are on the CC list for the bug.
You are receiving this mail because:
You are on the CC list for the bug.