diff options
| author | Armin Kuster <akuster@mvista.com> | 2018-08-06 19:47:00 -0700 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-08-15 10:22:45 +0100 |
| commit | aa7d33713c1b84e363088866b854900b86956630 (patch) | |
| tree | b1bc4fef77b03cac7c520ad0a4c7161eadc2ef90 | |
| parent | d85be1b736069ccad25b552cb1a431dad6d04270 (diff) | |
| download | poky-aa7d33713c1b84e363088866b854900b86956630.tar.gz | |
binutls: Security fix for CVE-2017-16826
Affects: <= 2.29.1
(From OE-Core rev: acac226dd46a0e27da51db75197f57dd45254502)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
| -rw-r--r-- | meta/recipes-devtools/binutils/binutils-2.29.1.inc | 1 | ||||
| -rw-r--r-- | meta/recipes-devtools/binutils/binutils/CVE-2017-16826.patch | 53 |
2 files changed, 54 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.29.1.inc b/meta/recipes-devtools/binutils/binutils-2.29.1.inc index cf131c62a0..73af74c0a8 100644 --- a/meta/recipes-devtools/binutils/binutils-2.29.1.inc +++ b/meta/recipes-devtools/binutils/binutils-2.29.1.inc | |||
| @@ -52,6 +52,7 @@ SRC_URI = "\ | |||
| 52 | file://CVE-2017-15225.patch \ | 52 | file://CVE-2017-15225.patch \ |
| 53 | file://CVE-2017-15939.patch \ | 53 | file://CVE-2017-15939.patch \ |
| 54 | file://CVE-2017-15996.patch \ | 54 | file://CVE-2017-15996.patch \ |
| 55 | file://CVE-2017-16826.patch \ | ||
| 55 | " | 56 | " |
| 56 | S = "${WORKDIR}/git" | 57 | S = "${WORKDIR}/git" |
| 57 | 58 | ||
diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2017-16826.patch b/meta/recipes-devtools/binutils/binutils/CVE-2017-16826.patch new file mode 100644 index 0000000000..bb24ba8834 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2017-16826.patch | |||
| @@ -0,0 +1,53 @@ | |||
| 1 | From a67d66eb97e7613a38ffe6622d837303b3ecd31d Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Nick Clifton <nickc@redhat.com> | ||
| 3 | Date: Wed, 1 Nov 2017 15:21:46 +0000 | ||
| 4 | Subject: [PATCH] Prevent illegal memory accesses when attempting to read | ||
| 5 | excessively large COFF line number tables. | ||
| 6 | |||
| 7 | PR 22376 | ||
| 8 | * coffcode.h (coff_slurp_line_table): Check for an excessively | ||
| 9 | large line number count. | ||
| 10 | |||
| 11 | Upstream-Status: Backport | ||
| 12 | Affects: <= 2.29.1 | ||
| 13 | CVE: CVE-2017-16826 | ||
| 14 | Signed-off-by: Armin Kuster <akuster@mvista.com> | ||
| 15 | |||
| 16 | --- | ||
| 17 | bfd/ChangeLog | 6 ++++++ | ||
| 18 | bfd/coffcode.h | 8 ++++++++ | ||
| 19 | 2 files changed, 14 insertions(+) | ||
| 20 | |||
| 21 | Index: git/bfd/coffcode.h | ||
| 22 | =================================================================== | ||
| 23 | --- git.orig/bfd/coffcode.h | ||
| 24 | +++ git/bfd/coffcode.h | ||
| 25 | @@ -4578,6 +4578,14 @@ coff_slurp_line_table (bfd *abfd, asecti | ||
| 26 | |||
| 27 | BFD_ASSERT (asect->lineno == NULL); | ||
| 28 | |||
| 29 | + if (asect->lineno_count > asect->size) | ||
| 30 | + { | ||
| 31 | + _bfd_error_handler | ||
| 32 | + (_("%B: warning: line number count (%#lx) exceeds section size (%#lx)"), | ||
| 33 | + abfd, (unsigned long) asect->lineno_count, (unsigned long) asect->size); | ||
| 34 | + return FALSE; | ||
| 35 | + } | ||
| 36 | + | ||
| 37 | amt = ((bfd_size_type) asect->lineno_count + 1) * sizeof (alent); | ||
| 38 | lineno_cache = (alent *) bfd_alloc (abfd, amt); | ||
| 39 | if (lineno_cache == NULL) | ||
| 40 | Index: git/bfd/ChangeLog | ||
| 41 | =================================================================== | ||
| 42 | --- git.orig/bfd/ChangeLog | ||
| 43 | +++ git/bfd/ChangeLog | ||
| 44 | @@ -1,3 +1,9 @@ | ||
| 45 | +2017-11-01 Nick Clifton <nickc@redhat.com> | ||
| 46 | + | ||
| 47 | + PR 22376 | ||
| 48 | + * coffcode.h (coff_slurp_line_table): Check for an excessively | ||
| 49 | + large line number count. | ||
| 50 | + | ||
| 51 | 2017-10-28 Alan Modra <amodra@gmail.com> | ||
| 52 | |||
| 53 | PR 22361 | ||
