diff options
author | Khem Raj <raj.khem@gmail.com> | 2023-07-31 15:42:32 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-08-04 11:44:28 +0100 |
commit | b5840b56361fa6be52ec292c167d9a7dc81d2f85 (patch) | |
tree | bc25ace93c702e343e0e92916099ef8d2776b3f8 /meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch | |
parent | 572d820da9a8857aec6075afe2de4ec478856633 (diff) | |
download | poky-b5840b56361fa6be52ec292c167d9a7dc81d2f85.tar.gz |
binutils: Upgrade to 2.41 release
Fix build on 32bit arches with 64bit off_t defaults
Detailed changes [1]
[1] https://sourceware.org/pipermail/binutils/2023-July/128719.html
(From OE-Core rev: c19fd803220f5b701dee077f7e7bfbb5ba2f22e3)
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch')
-rw-r--r-- | meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch | 43 |
1 files changed, 0 insertions, 43 deletions
diff --git a/meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch b/meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch deleted file mode 100644 index 31157cacd2..0000000000 --- a/meta/recipes-devtools/binutils/binutils/0001-Fix-an-illegal-memory-access-when-an-accessing-a-zer.patch +++ /dev/null | |||
@@ -1,43 +0,0 @@ | |||
1 | From c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57 Mon Sep 17 00:00:00 2001 | ||
2 | From: Nick Clifton <nickc@redhat.com> | ||
3 | Date: Thu, 30 Mar 2023 10:10:09 +0100 | ||
4 | Subject: [PATCH] Fix an illegal memory access when an accessing a | ||
5 | zer0-lengthverdef table. | ||
6 | |||
7 | PR 30285 | ||
8 | * elf.c (_bfd_elf_slurp_version_tables): Fail if no version definitions are allocated. | ||
9 | |||
10 | CVE: CVE-2023-1972 | ||
11 | Upstream-Status: Backport | ||
12 | Signed-off-by: Ross Burton <ross.burton@arm.com> | ||
13 | --- | ||
14 | bfd/ChangeLog | 6 ++++++ | ||
15 | bfd/elf.c | 5 +++++ | ||
16 | 2 files changed, 11 insertions(+) | ||
17 | |||
18 | diff --git a/bfd/elf.c b/bfd/elf.c | ||
19 | index 027d0143735..185028cbd97 100644 | ||
20 | --- a/bfd/elf.c | ||
21 | +++ b/bfd/elf.c | ||
22 | @@ -9030,6 +9030,9 @@ _bfd_elf_slurp_version_tables (bfd *abfd, bool default_imported_symver) | ||
23 | bfd_set_error (bfd_error_file_too_big); | ||
24 | goto error_return_verdef; | ||
25 | } | ||
26 | + | ||
27 | + if (amt == 0) | ||
28 | + goto error_return_verdef; | ||
29 | elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt); | ||
30 | if (elf_tdata (abfd)->verdef == NULL) | ||
31 | goto error_return_verdef; | ||
32 | @@ -9133,6 +9136,8 @@ _bfd_elf_slurp_version_tables (bfd *abfd, bool default_imported_symver) | ||
33 | bfd_set_error (bfd_error_file_too_big); | ||
34 | goto error_return; | ||
35 | } | ||
36 | + if (amt == 0) | ||
37 | + goto error_return; | ||
38 | elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt); | ||
39 | if (elf_tdata (abfd)->verdef == NULL) | ||
40 | goto error_return; | ||
41 | -- | ||
42 | 2.34.1 | ||
43 | |||