summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch
diff options
context:
space:
mode:
authorKhem Raj <raj.khem@gmail.com>2023-07-31 15:42:32 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2023-08-04 11:44:28 +0100
commitb5840b56361fa6be52ec292c167d9a7dc81d2f85 (patch)
treebc25ace93c702e343e0e92916099ef8d2776b3f8 /meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch
parent572d820da9a8857aec6075afe2de4ec478856633 (diff)
downloadpoky-b5840b56361fa6be52ec292c167d9a7dc81d2f85.tar.gz
binutils: Upgrade to 2.41 release
Fix build on 32bit arches with 64bit off_t defaults Detailed changes [1] [1] https://sourceware.org/pipermail/binutils/2023-July/128719.html (From OE-Core rev: c19fd803220f5b701dee077f7e7bfbb5ba2f22e3) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch')
-rw-r--r--meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch43
1 files changed, 0 insertions, 43 deletions
diff --git a/meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch b/meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch
deleted file mode 100644
index 31157cacd2..0000000000
--- a/meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch
+++ /dev/null
@@ -1,43 +0,0 @@
1From c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57 Mon Sep 17 00:00:00 2001
2From: Nick Clifton <nickc@redhat.com>
3Date: Thu, 30 Mar 2023 10:10:09 +0100
4Subject: [PATCH] Fix an illegal memory access when an accessing a
5 zer0-lengthverdef table.
6
7 PR 30285
8 * elf.c (_bfd_elf_slurp_version_tables): Fail if no version definitions are allocated.
9
10CVE: CVE-2023-1972
11Upstream-Status: Backport
12Signed-off-by: Ross Burton <ross.burton@arm.com>
13---
14 bfd/ChangeLog | 6 ++++++
15 bfd/elf.c | 5 +++++
16 2 files changed, 11 insertions(+)
17
18diff --git a/bfd/elf.c b/bfd/elf.c
19index 027d0143735..185028cbd97 100644
20--- a/bfd/elf.c
21+++ b/bfd/elf.c
22@@ -9030,6 +9030,9 @@ _bfd_elf_slurp_version_tables (bfd *abfd, bool default_imported_symver)
23 bfd_set_error (bfd_error_file_too_big);
24 goto error_return_verdef;
25 }
26+
27+ if (amt == 0)
28+ goto error_return_verdef;
29 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
30 if (elf_tdata (abfd)->verdef == NULL)
31 goto error_return_verdef;
32@@ -9133,6 +9136,8 @@ _bfd_elf_slurp_version_tables (bfd *abfd, bool default_imported_symver)
33 bfd_set_error (bfd_error_file_too_big);
34 goto error_return;
35 }
36+ if (amt == 0)
37+ goto error_return;
38 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
39 if (elf_tdata (abfd)->verdef == NULL)
40 goto error_return;
41--
422.34.1
43