summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRichard Purdie <richard.purdie@linuxfoundation.org>2023-11-23 14:58:06 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2023-11-23 14:59:06 +0000
commit1872cc9d5054ebf926c982e90debf4a9e1fbb5fd (patch)
tree3b76c3cd35bdc3602123073bba47f54ddb72c197
parent84e68041a2b86ea238d621b0381120e15647a58e (diff)
downloadpoky-1872cc9d5054ebf926c982e90debf4a9e1fbb5fd.tar.gz
Revert "binutils: Fix CVE-2022-47007"
This reverts commit 3f335913bbbabf48db1749d197c3bfaac9fb7236. This CVE shouldn't affect master, it is for binutils versions 2.34 thru 2.38, while master is 2.41 See: https://nvd.nist.gov/vuln/detail/CVE-2022-47007 Later in commit: https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=19cacf672930cee20feaf1f3468e3d5ac3099ffd elements of the CVE fix are reverted deliberately so match upstream for this and drop this 'fix'. Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/recipes-devtools/binutils/binutils-2.41.inc1
-rw-r--r--meta/recipes-devtools/binutils/binutils/0016-CVE-2022-47007.patch35
2 files changed, 0 insertions, 36 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.41.inc b/meta/recipes-devtools/binutils/binutils-2.41.inc
index bba87abba2..b4934c02a8 100644
--- a/meta/recipes-devtools/binutils/binutils-2.41.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.41.inc
@@ -34,6 +34,5 @@ SRC_URI = "\
34 file://0013-Define-alignof-using-_Alignof-when-using-C11-or-newe.patch \ 34 file://0013-Define-alignof-using-_Alignof-when-using-C11-or-newe.patch \
35 file://0014-Remove-duplicate-pe-dll.o-entry-deom-targ_extra_ofil.patch \ 35 file://0014-Remove-duplicate-pe-dll.o-entry-deom-targ_extra_ofil.patch \
36 file://0015-gprofng-Fix-build-with-64bit-file-offset-on-32bit-ma.patch \ 36 file://0015-gprofng-Fix-build-with-64bit-file-offset-on-32bit-ma.patch \
37 file://0016-CVE-2022-47007.patch \
38" 37"
39S = "${WORKDIR}/git" 38S = "${WORKDIR}/git"
diff --git a/meta/recipes-devtools/binutils/binutils/0016-CVE-2022-47007.patch b/meta/recipes-devtools/binutils/binutils/0016-CVE-2022-47007.patch
deleted file mode 100644
index 75ad6ad3ba..0000000000
--- a/meta/recipes-devtools/binutils/binutils/0016-CVE-2022-47007.patch
+++ /dev/null
@@ -1,35 +0,0 @@
1From: Alan Modra <amodra@gmail.com>
2Date: Thu, 16 Jun 2022 23:30:41 +0000 (+0930)
3Subject: PR29254, memory leak in stab_demangle_v3_arg
4X-Git-Tag: binutils-2_39~237
5X-Git-Url: https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb
6
7PR29254, memory leak in stab_demangle_v3_arg
8
9 PR 29254
10 * stabs.c (stab_demangle_v3_arg): Free dt on failure path.
11
12Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb]
13
14CVE: CVE-2022-47007
15
16Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
17
18---
19
20diff --git a/binutils/stabs.c b/binutils/stabs.c
21index 2b5241637c1..796ff85b86a 100644
22--- a/binutils/stabs.c
23+++ b/binutils/stabs.c
24@@ -5467,7 +5467,10 @@ stab_demangle_v3_arg (void *dhandle, struct stab_handle *info,
25 dc->u.s_binary.right,
26 &varargs);
27 if (pargs == NULL)
28- return NULL;
29+ {
30+ free (dt);
31+ return NULL;
32+ }
33
34 return debug_make_function_type (dhandle, dt, pargs, varargs);
35 }