summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorArmin Kuster <akuster808@gmail.com>2019-08-31 13:08:36 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2019-10-08 22:52:28 +0100
commitd39b67e491b0885ce2c594eab5d3984ae4b4aad0 (patch)
treea78c9cc5952813b47e9e0e22e97c92c1bdeca4e6
parent09d46e91317a9f03d4057b8a3f0dc6d0926817a6 (diff)
downloadpoky-d39b67e491b0885ce2c594eab5d3984ae4b4aad0.tar.gz
binutils: Security fix for CVE-2019-14444
Source: git://sourceware.org / binutils-gdb.git MR: 99255 Type: Security Fix Disposition: Backport from https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e17869db99195849826eaaf5d2d0eb2cfdd7a2a7 ChangeID: 67ad4ab1ec34b941bdcfbb4f55d16176bbbd3d72 Description: Affects: <= 2.32.0 Fixes CVE-2019-14444 (From OE-Core rev: a367928942411b36a0b0bbb95055d01548430e8e) Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/recipes-devtools/binutils/binutils-2.31.inc1
-rw-r--r--meta/recipes-devtools/binutils/binutils/CVE-2019-14444.patch33
2 files changed, 34 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.31.inc b/meta/recipes-devtools/binutils/binutils-2.31.inc
index 62acec500e..247f779a79 100644
--- a/meta/recipes-devtools/binutils/binutils-2.31.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.31.inc
@@ -46,6 +46,7 @@ SRC_URI = "\
46 file://CVE-2018-18605.patch \ 46 file://CVE-2018-18605.patch \
47 file://CVE-2018-18606.patch \ 47 file://CVE-2018-18606.patch \
48 file://CVE-2018-18607.patch \ 48 file://CVE-2018-18607.patch \
49 file://CVE-2019-14444.patch \
49" 50"
50S = "${WORKDIR}/git" 51S = "${WORKDIR}/git"
51 52
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2019-14444.patch b/meta/recipes-devtools/binutils/binutils/CVE-2019-14444.patch
new file mode 100644
index 0000000000..499cf0e046
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/CVE-2019-14444.patch
@@ -0,0 +1,33 @@
1From e17869db99195849826eaaf5d2d0eb2cfdd7a2a7 Mon Sep 17 00:00:00 2001
2From: Nick Clifton <nickc@redhat.com>
3Date: Mon, 5 Aug 2019 10:40:35 +0100
4Subject: [PATCH] Catch potential integer overflow in readelf when processing
5 corrupt binaries.
6
7 PR 24829
8 * readelf.c (apply_relocations): Catch potential integer overflow
9 whilst checking reloc location against section size.
10
11Upstream-Status: Backport
12https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e17869db99195849826eaaf5d2d0eb2cfdd7a2a7
13CVE: CVE-2019-14444
14Dropped changelog
15Signed-off-by: Armin Kuster <akuster@mvista.com>
16
17---
18 binutils/readelf.c | 2 +-
19 2 files changed, 7 insertions(+), 1 deletion(-)
20
21Index: git/binutils/readelf.c
22===================================================================
23--- git.orig/binutils/readelf.c
24+++ git/binutils/readelf.c
25@@ -13113,7 +13113,7 @@ apply_relocations (Filedata *
26 }
27
28 rloc = start + rp->r_offset;
29- if ((rloc + reloc_size) > end || (rloc < start))
30+ if (rloc >= end || (rloc + reloc_size) > end || (rloc < start))
31 {
32 warn (_("skipping invalid relocation offset 0x%lx in section %s\n"),
33 (unsigned long) rp->r_offset,