summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/binutils
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2018-08-06 19:47:00 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2018-08-15 10:22:45 +0100
commitaa7d33713c1b84e363088866b854900b86956630 (patch)
treeb1bc4fef77b03cac7c520ad0a4c7161eadc2ef90 /meta/recipes-devtools/binutils
parentd85be1b736069ccad25b552cb1a431dad6d04270 (diff)
downloadpoky-aa7d33713c1b84e363088866b854900b86956630.tar.gz
binutls: Security fix for CVE-2017-16826
Affects: <= 2.29.1 (From OE-Core rev: acac226dd46a0e27da51db75197f57dd45254502) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/binutils')
-rw-r--r--meta/recipes-devtools/binutils/binutils-2.29.1.inc1
-rw-r--r--meta/recipes-devtools/binutils/binutils/CVE-2017-16826.patch53
2 files changed, 54 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.29.1.inc b/meta/recipes-devtools/binutils/binutils-2.29.1.inc
index cf131c62a0..73af74c0a8 100644
--- a/meta/recipes-devtools/binutils/binutils-2.29.1.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.29.1.inc
@@ -52,6 +52,7 @@ SRC_URI = "\
52 file://CVE-2017-15225.patch \ 52 file://CVE-2017-15225.patch \
53 file://CVE-2017-15939.patch \ 53 file://CVE-2017-15939.patch \
54 file://CVE-2017-15996.patch \ 54 file://CVE-2017-15996.patch \
55 file://CVE-2017-16826.patch \
55" 56"
56S = "${WORKDIR}/git" 57S = "${WORKDIR}/git"
57 58
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2017-16826.patch b/meta/recipes-devtools/binutils/binutils/CVE-2017-16826.patch
new file mode 100644
index 0000000000..bb24ba8834
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/CVE-2017-16826.patch
@@ -0,0 +1,53 @@
1From a67d66eb97e7613a38ffe6622d837303b3ecd31d Mon Sep 17 00:00:00 2001
2From: Nick Clifton <nickc@redhat.com>
3Date: Wed, 1 Nov 2017 15:21:46 +0000
4Subject: [PATCH] Prevent illegal memory accesses when attempting to read
5 excessively large COFF line number tables.
6
7 PR 22376
8 * coffcode.h (coff_slurp_line_table): Check for an excessively
9 large line number count.
10
11Upstream-Status: Backport
12Affects: <= 2.29.1
13CVE: CVE-2017-16826
14Signed-off-by: Armin Kuster <akuster@mvista.com>
15
16---
17 bfd/ChangeLog | 6 ++++++
18 bfd/coffcode.h | 8 ++++++++
19 2 files changed, 14 insertions(+)
20
21Index: git/bfd/coffcode.h
22===================================================================
23--- git.orig/bfd/coffcode.h
24+++ git/bfd/coffcode.h
25@@ -4578,6 +4578,14 @@ coff_slurp_line_table (bfd *abfd, asecti
26
27 BFD_ASSERT (asect->lineno == NULL);
28
29+ if (asect->lineno_count > asect->size)
30+ {
31+ _bfd_error_handler
32+ (_("%B: warning: line number count (%#lx) exceeds section size (%#lx)"),
33+ abfd, (unsigned long) asect->lineno_count, (unsigned long) asect->size);
34+ return FALSE;
35+ }
36+
37 amt = ((bfd_size_type) asect->lineno_count + 1) * sizeof (alent);
38 lineno_cache = (alent *) bfd_alloc (abfd, amt);
39 if (lineno_cache == NULL)
40Index: git/bfd/ChangeLog
41===================================================================
42--- git.orig/bfd/ChangeLog
43+++ git/bfd/ChangeLog
44@@ -1,3 +1,9 @@
45+2017-11-01 Nick Clifton <nickc@redhat.com>
46+
47+ PR 22376
48+ * coffcode.h (coff_slurp_line_table): Check for an excessively
49+ large line number count.
50+
51 2017-10-28 Alan Modra <amodra@gmail.com>
52
53 PR 22361