summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorArmin Kuster <akuster808@gmail.com>2017-11-26 16:14:05 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-12-11 22:02:58 +0000
commit266586ff4c1e73ba941ebb66102381166d57bea5 (patch)
tree51eef46015b10ff0e0e86a177702c7d6c2616a60 /meta
parent9fba95a0e8798ef4bcca3221123dc3985f8fcd48 (diff)
downloadpoky-266586ff4c1e73ba941ebb66102381166d57bea5.tar.gz
binutls: Security fix for CVE-2017-9744
Affects: <= 2.28 (From OE-Core rev: 462cdbd112555a363eddfe3e47cd9b14fccf9395) Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-devtools/binutils/binutils-2.28.inc1
-rw-r--r--meta/recipes-devtools/binutils/binutils/CVE-2017-9744.patch46
2 files changed, 47 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.28.inc b/meta/recipes-devtools/binutils/binutils-2.28.inc
index 946f16c1c0..815e2bf5fb 100644
--- a/meta/recipes-devtools/binutils/binutils-2.28.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.28.inc
@@ -55,6 +55,7 @@ SRC_URI = "\
55 file://CVE-2017-9039.patch \ 55 file://CVE-2017-9039.patch \
56 file://CVE-2017-9040_9042.patch \ 56 file://CVE-2017-9040_9042.patch \
57 file://CVE-2017-9742.patch \ 57 file://CVE-2017-9742.patch \
58 file://CVE-2017-9744.patch \
58" 59"
59S = "${WORKDIR}/git" 60S = "${WORKDIR}/git"
60 61
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2017-9744.patch b/meta/recipes-devtools/binutils/binutils/CVE-2017-9744.patch
new file mode 100644
index 0000000000..c34a5a6ec9
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/CVE-2017-9744.patch
@@ -0,0 +1,46 @@
1From f461bbd847f15657f3dd2f317c30c75a7520da1f Mon Sep 17 00:00:00 2001
2From: Nick Clifton <nickc@redhat.com>
3Date: Wed, 14 Jun 2017 17:01:54 +0100
4Subject: [PATCH] Fix address violation bug when disassembling a corrupt SH
5 binary.
6
7 PR binutils/21578
8 * elf32-sh.c (sh_elf_set_mach_from_flags): Fix check for invalid
9 flag value.
10
11Upstream-Status: Backport
12CVE: CVE-2017-9744
13Signed-off-by: Armin Kuster <akuster@mvista.com>
14
15---
16 bfd/ChangeLog | 6 ++++++
17 bfd/elf32-sh.c | 2 +-
18 2 files changed, 7 insertions(+), 1 deletion(-)
19
20Index: git/bfd/elf32-sh.c
21===================================================================
22--- git.orig/bfd/elf32-sh.c
23+++ git/bfd/elf32-sh.c
24@@ -6344,7 +6344,7 @@ sh_elf_set_mach_from_flags (bfd *abfd)
25 {
26 flagword flags = elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK;
27
28- if (flags >= sizeof(sh_ef_bfd_table))
29+ if (flags >= ARRAY_SIZE (sh_ef_bfd_table))
30 return FALSE;
31
32 if (sh_ef_bfd_table[flags] == 0)
33Index: git/bfd/ChangeLog
34===================================================================
35--- git.orig/bfd/ChangeLog
36+++ git/bfd/ChangeLog
37@@ -1,3 +1,9 @@
38+2017-06-14 Nick Clifton <nickc@redhat.com>
39+
40+ PR binutils/21578
41+ * elf32-sh.c (sh_elf_set_mach_from_flags): Fix check for invalid
42+ flag value.
43+
44 2017-04-29 Alan Modra <amodra@gmail.com>
45
46 PR 21432