summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/binutils
diff options
context:
space:
mode:
authorDeepesh Varatharajan <Deepesh.Varatharajan@windriver.com>2025-03-05 21:43:48 -0800
committerSteve Sakoman <steve@sakoman.com>2025-03-08 06:22:57 -0800
commitdc83c0c30ad57eaccd4a238c7719c4b104063172 (patch)
tree5e0edbb916e2810bef1abf441d22dd963cb1f6ec /meta/recipes-devtools/binutils
parenta18a302dba4acc867e92abc0856cb0f5fce6d8a8 (diff)
downloadpoky-dc83c0c30ad57eaccd4a238c7719c4b104063172.tar.gz
binutils: Fix CVE-2025-0840
PR32560 stack-buffer-overflow at objdump disassemble_bytes Backport a patch from upstream to fix CVE-2025-0840 Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893] (From OE-Core rev: 338a2a95eb9a99c8e56dfb1f6336497ddd654372) Signed-off-by: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-devtools/binutils')
-rw-r--r--meta/recipes-devtools/binutils/binutils-2.42.inc1
-rw-r--r--meta/recipes-devtools/binutils/binutils/0018-CVE-2025-0840.patch53
2 files changed, 54 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc
index 8bccf8c56a..809c4207d4 100644
--- a/meta/recipes-devtools/binutils/binutils-2.42.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.42.inc
@@ -38,5 +38,6 @@ SRC_URI = "\
38 file://0015-gprofng-change-use-of-bignum-to-bigint.patch \ 38 file://0015-gprofng-change-use-of-bignum-to-bigint.patch \
39 file://0016-CVE-2024-53589.patch \ 39 file://0016-CVE-2024-53589.patch \
40 file://0017-dlltool-file-name-too-long.patch \ 40 file://0017-dlltool-file-name-too-long.patch \
41 file://0018-CVE-2025-0840.patch \
41" 42"
42S = "${WORKDIR}/git" 43S = "${WORKDIR}/git"
diff --git a/meta/recipes-devtools/binutils/binutils/0018-CVE-2025-0840.patch b/meta/recipes-devtools/binutils/binutils/0018-CVE-2025-0840.patch
new file mode 100644
index 0000000000..3814d63e1f
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/0018-CVE-2025-0840.patch
@@ -0,0 +1,53 @@
1Author: Alan Modra <amodra@gmail.com>
2Date: Wed, 15 Jan 2025 19:13:43 +1030
3
4PR32560 stack-buffer-overflow at objdump disassemble_bytes
5
6There's always someone pushing the boundaries.
7
8 PR 32560
9 * objdump.c (MAX_INSN_WIDTH): Define.
10 (insn_width): Make it an unsigned long.
11 (disassemble_bytes): Use MAX_INSN_WIDTH to size buffer.
12 (main <OPTION_INSN_WIDTH>): Restrict size of insn_width.
13
14Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893]
15CVE: CVE-2025-0840
16
17Signed-off-by: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com>
18
19diff --git a/binutils/objdump.c b/binutils/objdump.c
20index 49e944b1..dba726e3 100644
21--- a/binutils/objdump.c
22+++ b/binutils/objdump.c
23@@ -116,7 +116,8 @@ static bool disassemble_all; /* -D */
24 static int disassemble_zeroes; /* --disassemble-zeroes */
25 static bool formats_info; /* -i */
26 int wide_output; /* -w */
27-static int insn_width; /* --insn-width */
28+#define MAX_INSN_WIDTH 49
29+static unsigned long insn_width; /* --insn-width */
30 static bfd_vma start_address = (bfd_vma) -1; /* --start-address */
31 static bfd_vma stop_address = (bfd_vma) -1; /* --stop-address */
32 static int dump_debugging; /* --debugging */
33@@ -3327,7 +3328,7 @@ disassemble_bytes (struct disassemble_info *inf,
34 }
35 else
36 {
37- char buf[50];
38+ char buf[MAX_INSN_WIDTH + 1];
39 unsigned int bpc = 0;
40 unsigned int pb = 0;
41
42@@ -5995,8 +5996,9 @@ main (int argc, char **argv)
43 break;
44 case OPTION_INSN_WIDTH:
45 insn_width = strtoul (optarg, NULL, 0);
46- if (insn_width <= 0)
47- fatal (_("error: instruction width must be positive"));
48+ if (insn_width - 1 >= MAX_INSN_WIDTH)
49+ fatal (_("error: instruction width must be in the range 1 to "
50+ XSTRING (MAX_INSN_WIDTH)));
51 break;
52 case OPTION_INLINES:
53 unwind_inlines = true;