diff options
author | Armin Kuster <akuster808@gmail.com> | 2019-08-31 13:08:36 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2019-10-08 22:52:28 +0100 |
commit | d39b67e491b0885ce2c594eab5d3984ae4b4aad0 (patch) | |
tree | a78c9cc5952813b47e9e0e22e97c92c1bdeca4e6 | |
parent | 09d46e91317a9f03d4057b8a3f0dc6d0926817a6 (diff) | |
download | poky-d39b67e491b0885ce2c594eab5d3984ae4b4aad0.tar.gz |
binutils: Security fix for CVE-2019-14444
Source: git://sourceware.org / binutils-gdb.git
MR: 99255
Type: Security Fix
Disposition: Backport from https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e17869db99195849826eaaf5d2d0eb2cfdd7a2a7
ChangeID: 67ad4ab1ec34b941bdcfbb4f55d16176bbbd3d72
Description:
Affects: <= 2.32.0
Fixes CVE-2019-14444
(From OE-Core rev: a367928942411b36a0b0bbb95055d01548430e8e)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r-- | meta/recipes-devtools/binutils/binutils-2.31.inc | 1 | ||||
-rw-r--r-- | meta/recipes-devtools/binutils/binutils/CVE-2019-14444.patch | 33 |
2 files changed, 34 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.31.inc b/meta/recipes-devtools/binutils/binutils-2.31.inc index 62acec500e..247f779a79 100644 --- a/meta/recipes-devtools/binutils/binutils-2.31.inc +++ b/meta/recipes-devtools/binutils/binutils-2.31.inc | |||
@@ -46,6 +46,7 @@ SRC_URI = "\ | |||
46 | file://CVE-2018-18605.patch \ | 46 | file://CVE-2018-18605.patch \ |
47 | file://CVE-2018-18606.patch \ | 47 | file://CVE-2018-18606.patch \ |
48 | file://CVE-2018-18607.patch \ | 48 | file://CVE-2018-18607.patch \ |
49 | file://CVE-2019-14444.patch \ | ||
49 | " | 50 | " |
50 | S = "${WORKDIR}/git" | 51 | S = "${WORKDIR}/git" |
51 | 52 | ||
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2019-14444.patch b/meta/recipes-devtools/binutils/binutils/CVE-2019-14444.patch new file mode 100644 index 0000000000..499cf0e046 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2019-14444.patch | |||
@@ -0,0 +1,33 @@ | |||
1 | From e17869db99195849826eaaf5d2d0eb2cfdd7a2a7 Mon Sep 17 00:00:00 2001 | ||
2 | From: Nick Clifton <nickc@redhat.com> | ||
3 | Date: Mon, 5 Aug 2019 10:40:35 +0100 | ||
4 | Subject: [PATCH] Catch potential integer overflow in readelf when processing | ||
5 | corrupt binaries. | ||
6 | |||
7 | PR 24829 | ||
8 | * readelf.c (apply_relocations): Catch potential integer overflow | ||
9 | whilst checking reloc location against section size. | ||
10 | |||
11 | Upstream-Status: Backport | ||
12 | https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e17869db99195849826eaaf5d2d0eb2cfdd7a2a7 | ||
13 | CVE: CVE-2019-14444 | ||
14 | Dropped changelog | ||
15 | Signed-off-by: Armin Kuster <akuster@mvista.com> | ||
16 | |||
17 | --- | ||
18 | binutils/readelf.c | 2 +- | ||
19 | 2 files changed, 7 insertions(+), 1 deletion(-) | ||
20 | |||
21 | Index: git/binutils/readelf.c | ||
22 | =================================================================== | ||
23 | --- git.orig/binutils/readelf.c | ||
24 | +++ git/binutils/readelf.c | ||
25 | @@ -13113,7 +13113,7 @@ apply_relocations (Filedata * | ||
26 | } | ||
27 | |||
28 | rloc = start + rp->r_offset; | ||
29 | - if ((rloc + reloc_size) > end || (rloc < start)) | ||
30 | + if (rloc >= end || (rloc + reloc_size) > end || (rloc < start)) | ||
31 | { | ||
32 | warn (_("skipping invalid relocation offset 0x%lx in section %s\n"), | ||
33 | (unsigned long) rp->r_offset, | ||