summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/binutils/binutils/CVE-2017-17124.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-devtools/binutils/binutils/CVE-2017-17124.patch')
-rw-r--r--meta/recipes-devtools/binutils/binutils/CVE-2017-17124.patch47
1 files changed, 47 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2017-17124.patch b/meta/recipes-devtools/binutils/binutils/CVE-2017-17124.patch
new file mode 100644
index 0000000000..16f0768d95
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/CVE-2017-17124.patch
@@ -0,0 +1,47 @@
1From b0029dce6867de1a2828293177b0e030d2f0f03c Mon Sep 17 00:00:00 2001
2From: Nick Clifton <nickc@redhat.com>
3Date: Tue, 28 Nov 2017 18:00:29 +0000
4Subject: [PATCH] Prevent a memory exhaustion problem when trying to read in
5 strings from a COFF binary with a corrupt string table size.
6
7 PR 22507
8 * coffgen.c (_bfd_coff_read_string_table): Check for an excessive
9 size of the external string table.
10
11Upstream-Status: Backport
12Affects binutls <= 2.29.1
13CVE: CVE-2017-17124
14Signed-off-by: Armin Kuster <akuster@mvista.com>
15
16---
17 bfd/ChangeLog | 6 ++++++
18 bfd/coffgen.c | 4 ++--
19 2 files changed, 8 insertions(+), 2 deletions(-)
20
21Index: git/bfd/coffgen.c
22===================================================================
23--- git.orig/bfd/coffgen.c
24+++ git/bfd/coffgen.c
25@@ -1709,7 +1709,7 @@ _bfd_coff_read_string_table (bfd *abfd)
26 #endif
27 }
28
29- if (strsize < STRING_SIZE_SIZE)
30+ if (strsize < STRING_SIZE_SIZE || strsize > bfd_get_file_size (abfd))
31 {
32 _bfd_error_handler
33 /* xgettext: c-format */
34Index: git/bfd/ChangeLog
35===================================================================
36--- git.orig/bfd/ChangeLog
37+++ git/bfd/ChangeLog
38@@ -1,3 +1,9 @@
39+2017-11-28 Nick Clifton <nickc@redhat.com>
40+
41+ PR 22507
42+ * coffgen.c (_bfd_coff_read_string_table): Check for an excessive
43+ size of the external string table.
44+
45 2018-03-28 Eric Botcazou <ebotcazou@adacore.com>
46
47 PR ld/22972