summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2018-08-05 21:56:30 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2018-08-06 16:24:02 +0100
commit219deb5228e423684972854599e6d2b30e5bf2d9 (patch)
tree3efa57afc92d558f5ce945405deb88e7e112abb8 /meta/recipes-devtools
parent3db593919bcb10938d02f6eec1a026d16191b225 (diff)
downloadpoky-219deb5228e423684972854599e6d2b30e5bf2d9.tar.gz
binutls: Security fix CVE-2018-7569
Affects <= 2.30 (From OE-Core rev: f79f5162088ceb29cf4820d2c3ef2aff263d7967) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools')
-rw-r--r--meta/recipes-devtools/binutils/binutils-2.30.inc1
-rw-r--r--meta/recipes-devtools/binutils/binutils/CVE-2018-7569.patch119
2 files changed, 120 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.30.inc b/meta/recipes-devtools/binutils/binutils-2.30.inc
index 3a39d5f7b8..32eb44e08b 100644
--- a/meta/recipes-devtools/binutils/binutils-2.30.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.30.inc
@@ -41,6 +41,7 @@ SRC_URI = "\
41 file://CVE-2018-6759.patch \ 41 file://CVE-2018-6759.patch \
42 file://CVE-2018-7642.patch \ 42 file://CVE-2018-7642.patch \
43 file://CVE-2018-7208.patch \ 43 file://CVE-2018-7208.patch \
44 file://CVE-2018-7569.patch \
44" 45"
45S = "${WORKDIR}/git" 46S = "${WORKDIR}/git"
46 47
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2018-7569.patch b/meta/recipes-devtools/binutils/binutils/CVE-2018-7569.patch
new file mode 100644
index 0000000000..96c0fd2422
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/CVE-2018-7569.patch
@@ -0,0 +1,119 @@
1From 12c963421d045a127c413a0722062b9932c50aa9 Mon Sep 17 00:00:00 2001
2From: Nick Clifton <nickc@redhat.com>
3Date: Wed, 28 Feb 2018 11:50:49 +0000
4Subject: [PATCH] Catch integer overflows/underflows when parsing corrupt DWARF
5 FORM blocks.
6
7 PR 22895
8 PR 22893
9 * dwarf2.c (read_n_bytes): Replace size parameter with dwarf_block
10 pointer. Drop unused abfd parameter. Check the size of the block
11 before initialising the data field. Return the end pointer if the
12 size is invalid.
13 (read_attribute_value): Adjust invocations of read_n_bytes.
14
15Upstream-Status: Backport
16Affects: Binutils <= 2.30
17CVE: CVE-2018-7569
18Signed-off-by: Armin Kuster <akuster@mvista.com>
19---
20 bfd/ChangeLog | 8 ++++++++
21 bfd/dwarf2.c | 36 +++++++++++++++++++++---------------
22 2 files changed, 29 insertions(+), 15 deletions(-)
23
24Index: git/bfd/dwarf2.c
25===================================================================
26--- git.orig/bfd/dwarf2.c
27+++ git/bfd/dwarf2.c
28@@ -622,14 +622,24 @@ read_8_bytes (bfd *abfd, bfd_byte *buf,
29 }
30
31 static bfd_byte *
32-read_n_bytes (bfd *abfd ATTRIBUTE_UNUSED,
33- bfd_byte *buf,
34- bfd_byte *end,
35- unsigned int size ATTRIBUTE_UNUSED)
36-{
37- if (buf + size > end)
38- return NULL;
39- return buf;
40+read_n_bytes (bfd_byte * buf,
41+ bfd_byte * end,
42+ struct dwarf_block * block)
43+{
44+ unsigned int size = block->size;
45+ bfd_byte * block_end = buf + size;
46+
47+ if (block_end > end || block_end < buf)
48+ {
49+ block->data = NULL;
50+ block->size = 0;
51+ return end;
52+ }
53+ else
54+ {
55+ block->data = buf;
56+ return block_end;
57+ }
58 }
59
60 /* Scans a NUL terminated string starting at BUF, returning a pointer to it.
61@@ -1127,8 +1137,7 @@ read_attribute_value (struct attribute *
62 return NULL;
63 blk->size = read_2_bytes (abfd, info_ptr, info_ptr_end);
64 info_ptr += 2;
65- blk->data = read_n_bytes (abfd, info_ptr, info_ptr_end, blk->size);
66- info_ptr += blk->size;
67+ info_ptr = read_n_bytes (info_ptr, info_ptr_end, blk);
68 attr->u.blk = blk;
69 break;
70 case DW_FORM_block4:
71@@ -1138,8 +1147,7 @@ read_attribute_value (struct attribute *
72 return NULL;
73 blk->size = read_4_bytes (abfd, info_ptr, info_ptr_end);
74 info_ptr += 4;
75- blk->data = read_n_bytes (abfd, info_ptr, info_ptr_end, blk->size);
76- info_ptr += blk->size;
77+ info_ptr = read_n_bytes (info_ptr, info_ptr_end, blk);
78 attr->u.blk = blk;
79 break;
80 case DW_FORM_data2:
81@@ -1179,8 +1187,7 @@ read_attribute_value (struct attribute *
82 blk->size = _bfd_safe_read_leb128 (abfd, info_ptr, &bytes_read,
83 FALSE, info_ptr_end);
84 info_ptr += bytes_read;
85- blk->data = read_n_bytes (abfd, info_ptr, info_ptr_end, blk->size);
86- info_ptr += blk->size;
87+ info_ptr = read_n_bytes (info_ptr, info_ptr_end, blk);
88 attr->u.blk = blk;
89 break;
90 case DW_FORM_block1:
91@@ -1190,8 +1197,7 @@ read_attribute_value (struct attribute *
92 return NULL;
93 blk->size = read_1_byte (abfd, info_ptr, info_ptr_end);
94 info_ptr += 1;
95- blk->data = read_n_bytes (abfd, info_ptr, info_ptr_end, blk->size);
96- info_ptr += blk->size;
97+ info_ptr = read_n_bytes (info_ptr, info_ptr_end, blk);
98 attr->u.blk = blk;
99 break;
100 case DW_FORM_data1:
101Index: git/bfd/ChangeLog
102===================================================================
103--- git.orig/bfd/ChangeLog
104+++ git/bfd/ChangeLog
105@@ -6,6 +6,14 @@
106
107 2018-02-28 Alan Modra <amodra@gmail.com>
108
109+ PR 22895
110+ PR 22893
111+ * dwarf2.c (read_n_bytes): Replace size parameter with dwarf_block
112+ pointer. Drop unused abfd parameter. Check the size of the block
113+ before initialising the data field. Return the end pointer if the
114+ size is invalid.
115+ (read_attribute_value): Adjust invocations of read_n_bytes.
116+
117 PR 22887
118 * aoutx.h (swap_std_reloc_in): Correct r_index bound check.
119