summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorArmin Kuster <akuster808@gmail.com>2017-11-26 16:32:47 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-12-11 22:02:59 +0000
commit4aff74cf1efaa18d0292644d7a3c71b98d03a549 (patch)
tree9ee959f1afc6a587f6201d5c537f770875b80d4a
parent3f098a0f6e1ecc840291c9d3a11e10ec1647a36e (diff)
downloadpoky-4aff74cf1efaa18d0292644d7a3c71b98d03a549.tar.gz
binutls: Secuirty fix for CVE-2017-9756
Affects: <= 2.28 (From OE-Core rev: 59956de9ffd18d65c41697772e2b95da982cc803) Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/recipes-devtools/binutils/binutils-2.28.inc1
-rw-r--r--meta/recipes-devtools/binutils/binutils/CVE-2017-9756.patch50
2 files changed, 51 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.28.inc b/meta/recipes-devtools/binutils/binutils-2.28.inc
index b4299c8897..a2b2901b63 100644
--- a/meta/recipes-devtools/binutils/binutils-2.28.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.28.inc
@@ -66,6 +66,7 @@ SRC_URI = "\
66 file://CVE-2017-9752.patch \ 66 file://CVE-2017-9752.patch \
67 file://CVE-2017-9753.patch \ 67 file://CVE-2017-9753.patch \
68 file://CVE-2017-9755.patch \ 68 file://CVE-2017-9755.patch \
69 file://CVE-2017-9756.patch \
69" 70"
70S = "${WORKDIR}/git" 71S = "${WORKDIR}/git"
71 72
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2017-9756.patch b/meta/recipes-devtools/binutils/binutils/CVE-2017-9756.patch
new file mode 100644
index 0000000000..191d0be198
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/CVE-2017-9756.patch
@@ -0,0 +1,50 @@
1From cd3ea7c69acc5045eb28f9bf80d923116e15e4f5 Mon Sep 17 00:00:00 2001
2From: Nick Clifton <nickc@redhat.com>
3Date: Thu, 15 Jun 2017 13:26:54 +0100
4Subject: [PATCH] Prevent address violation problem when disassembling corrupt
5 aarch64 binary.
6
7 PR binutils/21595
8 * aarch64-dis.c (aarch64_ext_ldst_reglist): Check for an out of
9 range value.
10
11Upstream-Status: Backport
12CVE: CVE-2017-9756
13Signed-off-by: Armin Kuster <akuster@mvista.com>
14
15---
16 opcodes/ChangeLog | 6 ++++++
17 opcodes/aarch64-dis.c | 3 +++
18 2 files changed, 9 insertions(+)
19
20Index: git/opcodes/ChangeLog
21===================================================================
22--- git.orig/opcodes/ChangeLog
23+++ git/opcodes/ChangeLog
24@@ -6,6 +6,12 @@
25
26 2017-06-15 Nick Clifton <nickc@redhat.com>
27
28+ PR binutils/21595
29+ * aarch64-dis.c (aarch64_ext_ldst_reglist): Check for an out of
30+ range value.
31+
32+2017-06-15 Nick Clifton <nickc@redhat.com>
33+
34 PR binutils/21588
35 * rl78-decode.opc (OP_BUF_LEN): Define.
36 (GETBYTE): Check for the index exceeding OP_BUF_LEN.
37Index: git/opcodes/aarch64-dis.c
38===================================================================
39--- git.orig/opcodes/aarch64-dis.c
40+++ git/opcodes/aarch64-dis.c
41@@ -409,6 +409,9 @@ aarch64_ext_ldst_reglist (const aarch64_
42 info->reglist.first_regno = extract_field (FLD_Rt, code, 0);
43 /* opcode */
44 value = extract_field (FLD_opcode, code, 0);
45+ /* PR 21595: Check for a bogus value. */
46+ if (value >= ARRAY_SIZE (data))
47+ return 0;
48 if (expected_num != data[value].num_elements || data[value].is_reserved)
49 return 0;
50 info->reglist.num_regs = data[value].num_regs;