summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2018-08-06 18:21:26 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2018-08-15 10:22:45 +0100
commitfb5416e8749906b2a86b1953cef77bd20d113574 (patch)
tree463ae5f8c68278c736b7066b90d70271cfeddd38
parentbc0ca9fb89110edb0d3c7b5f7c16e483922bfe1f (diff)
downloadpoky-fb5416e8749906b2a86b1953cef77bd20d113574.tar.gz
binutls: Security fix for CVE-2017-15021
Affects: <= 2.29.1 (From OE-Core rev: 65411acb41a2461aab2904fea2d348d2a06e48e0) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/recipes-devtools/binutils/binutils-2.29.1.inc1
-rw-r--r--meta/recipes-devtools/binutils/binutils/CVE-2017-15021.patch48
2 files changed, 49 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.29.1.inc b/meta/recipes-devtools/binutils/binutils-2.29.1.inc
index bd25a525be..cdfbd26c46 100644
--- a/meta/recipes-devtools/binutils/binutils-2.29.1.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.29.1.inc
@@ -44,6 +44,7 @@ SRC_URI = "\
44 file://CVE-2017-14938.patch \ 44 file://CVE-2017-14938.patch \
45 file://CVE-2017-14939.patch \ 45 file://CVE-2017-14939.patch \
46 file://CVE-2017-14940.patch \ 46 file://CVE-2017-14940.patch \
47 file://CVE-2017-15021.patch \
47" 48"
48S = "${WORKDIR}/git" 49S = "${WORKDIR}/git"
49 50
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2017-15021.patch b/meta/recipes-devtools/binutils/binutils/CVE-2017-15021.patch
new file mode 100644
index 0000000000..caca7b107e
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/CVE-2017-15021.patch
@@ -0,0 +1,48 @@
1From 52b36c51e5bf6d7600fdc6ba115b170b0e78e31d Mon Sep 17 00:00:00 2001
2From: Alan Modra <amodra@gmail.com>
3Date: Sun, 24 Sep 2017 21:36:18 +0930
4Subject: [PATCH] PR22197, buffer overflow in bfd_get_debug_link_info_1
5
6 PR 22197
7 * opncls.c (bfd_get_debug_link_info_1): Properly check that crc is
8 within section bounds.
9
10Upstream-Status: Backport
11Affects: <= 2.29.1
12CVE: CVE-2017-15021
13Signed-off-by: Armin Kuster <akuster@mvista.com>
14
15---
16 bfd/ChangeLog | 6 ++++++
17 bfd/opncls.c | 2 +-
18 2 files changed, 7 insertions(+), 1 deletion(-)
19
20Index: git/bfd/opncls.c
21===================================================================
22--- git.orig/bfd/opncls.c
23+++ git/bfd/opncls.c
24@@ -1200,7 +1200,7 @@ bfd_get_debug_link_info_1 (bfd *abfd, vo
25 /* PR 17597: avoid reading off the end of the buffer. */
26 crc_offset = strnlen (name, bfd_get_section_size (sect)) + 1;
27 crc_offset = (crc_offset + 3) & ~3;
28- if (crc_offset >= bfd_get_section_size (sect))
29+ if (crc_offset + 4 > bfd_get_section_size (sect))
30 return NULL;
31
32 *crc32 = bfd_get_32 (abfd, contents + crc_offset);
33Index: git/bfd/ChangeLog
34===================================================================
35--- git.orig/bfd/ChangeLog
36+++ git/bfd/ChangeLog
37@@ -1,5 +1,11 @@
38 2017-09-24 Alan Modra <amodra@gmail.com>
39
40+ PR 22197
41+ * opncls.c (bfd_get_debug_link_info_1): Properly check that crc is
42+ within section bounds.
43+
44+2017-09-24 Alan Modra <amodra@gmail.com>
45+
46 PR 22167
47 * dwarf2.c (scan_unit_for_symbols): Check u.blk->data is non-NULL.
48