summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/gcc
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2019-09-02 13:37:59 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2019-09-06 08:15:45 +0100
commite674655bdfbbb5a60ff9698aa05b1ac8c661e6e6 (patch)
tree32489e5a40e3c04405c680d320687c32b3d7b247 /meta/recipes-devtools/gcc
parent906bb516778f9c68fee4ccaecded52477b0bf418 (diff)
downloadpoky-e674655bdfbbb5a60ff9698aa05b1ac8c661e6e6.tar.gz
gcc-8.3: Security fix for CVE-2019-14250
Affects < 9.2 (From OE-Core rev: c608f32995c6f067c4f56e46c527e8e9c79e2295) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/gcc')
-rw-r--r--meta/recipes-devtools/gcc/gcc-8.3.inc1
-rw-r--r--meta/recipes-devtools/gcc/gcc-8.3/CVE-2019-14250.patch44
2 files changed, 45 insertions, 0 deletions
diff --git a/meta/recipes-devtools/gcc/gcc-8.3.inc b/meta/recipes-devtools/gcc/gcc-8.3.inc
index 1781ff5b5d..4b0d6f2267 100644
--- a/meta/recipes-devtools/gcc/gcc-8.3.inc
+++ b/meta/recipes-devtools/gcc/gcc-8.3.inc
@@ -73,6 +73,7 @@ SRC_URI = "\
73 file://0041-Add-a-recursion-limit-to-libiberty-s-demangling-code.patch \ 73 file://0041-Add-a-recursion-limit-to-libiberty-s-demangling-code.patch \
74 file://0042-PR-debug-86964.patch \ 74 file://0042-PR-debug-86964.patch \
75 file://0043-PR85434-Prevent-spilling-of-stack-protector-guard-s-.patch \ 75 file://0043-PR85434-Prevent-spilling-of-stack-protector-guard-s-.patch \
76 file://CVE-2019-14250.patch \
76" 77"
77SRC_URI[md5sum] = "65b210b4bfe7e060051f799e0f994896" 78SRC_URI[md5sum] = "65b210b4bfe7e060051f799e0f994896"
78SRC_URI[sha256sum] = "64baadfe6cc0f4947a84cb12d7f0dfaf45bb58b7e92461639596c21e02d97d2c" 79SRC_URI[sha256sum] = "64baadfe6cc0f4947a84cb12d7f0dfaf45bb58b7e92461639596c21e02d97d2c"
diff --git a/meta/recipes-devtools/gcc/gcc-8.3/CVE-2019-14250.patch b/meta/recipes-devtools/gcc/gcc-8.3/CVE-2019-14250.patch
new file mode 100644
index 0000000000..e327684e16
--- /dev/null
+++ b/meta/recipes-devtools/gcc/gcc-8.3/CVE-2019-14250.patch
@@ -0,0 +1,44 @@
1From a4f1b58eb48b349a5f353bc69c30be553506d33b Mon Sep 17 00:00:00 2001
2From: rguenth <rguenth@138bc75d-0d04-0410-961f-82ee72b054a4>
3Date: Thu, 25 Jul 2019 10:48:26 +0000
4Subject: [PATCH] 2019-07-25 Richard Biener <rguenther@suse.de>
5
6 PR lto/90924
7 Backport from mainline
8 2019-07-12 Ren Kimura <rkx1209dev@gmail.com>
9
10 * simple-object-elf.c (simple_object_elf_match): Check zero value
11 shstrndx.
12
13
14git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/branches/gcc-8-branch@273794 138bc75d-0d04-0410-961f-82ee72b054a4
15
16Upstream-Status: Backport
17Affectes: < 9.2
18CVE: CVE-2019-14250
19Dropped changelog
20Signed-off-by: Armin Kuster <Akustre@mvista.com>
21
22---
23 libiberty/simple-object-elf.c | 8 ++++++++
24 2 files changed, 17 insertions(+)
25
26Index: gcc-8.2.0/libiberty/simple-object-elf.c
27===================================================================
28--- gcc-8.2.0.orig/libiberty/simple-object-elf.c
29+++ gcc-8.2.0/libiberty/simple-object-elf.c
30@@ -549,6 +549,14 @@ simple_object_elf_match (unsigned char h
31 return NULL;
32 }
33
34+ if (eor->shstrndx == 0)
35+ {
36+ *errmsg = "invalid ELF shstrndx == 0";
37+ *err = 0;
38+ XDELETE (eor);
39+ return NULL;
40+ }
41+
42 return (void *) eor;
43 }
44