diff options
| author | pgowda <pgowda.cve@gmail.com> | 2022-12-19 21:01:33 +0530 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-12-21 10:16:31 +0000 |
| commit | 696b799922438f191e360c1da48cf1565712247b (patch) | |
| tree | 3def9d2a6f37397e4d639d9ea4d64c0aa1a4e607 /meta | |
| parent | 93215bf4b224b036d841b5f032cf16d45886151d (diff) | |
| download | poky-696b799922438f191e360c1da48cf1565712247b.tar.gz | |
binutils: Add patch to fix CVE-2022-4285
Backport a patch from upstream to address CVE-2022-4285
[https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70]
(From OE-Core rev: b6b750f8e41a392ff92d9118ef7530ada20d06fe)
Signed-off-by: pgowda <pgowda.cve@gmail.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
| -rw-r--r-- | meta/recipes-devtools/binutils/binutils-2.39.inc | 1 | ||||
| -rw-r--r-- | meta/recipes-devtools/binutils/binutils/0015-CVE-2022-4285.patch | 37 |
2 files changed, 38 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.39.inc b/meta/recipes-devtools/binutils/binutils-2.39.inc index b040e57037..419571d56c 100644 --- a/meta/recipes-devtools/binutils/binutils-2.39.inc +++ b/meta/recipes-devtools/binutils/binutils-2.39.inc | |||
| @@ -35,6 +35,7 @@ SRC_URI = "\ | |||
| 35 | file://0014-CVE-2022-38128-1.patch \ | 35 | file://0014-CVE-2022-38128-1.patch \ |
| 36 | file://0014-CVE-2022-38128-2.patch \ | 36 | file://0014-CVE-2022-38128-2.patch \ |
| 37 | file://0014-CVE-2022-38128-3.patch \ | 37 | file://0014-CVE-2022-38128-3.patch \ |
| 38 | file://0015-CVE-2022-4285.patch \ | ||
| 38 | " | 39 | " |
| 39 | S = "${WORKDIR}/git" | 40 | S = "${WORKDIR}/git" |
| 40 | # Already in 2.39 branch | 41 | # Already in 2.39 branch |
diff --git a/meta/recipes-devtools/binutils/binutils/0015-CVE-2022-4285.patch b/meta/recipes-devtools/binutils/binutils/0015-CVE-2022-4285.patch new file mode 100644 index 0000000000..46ec0b15a3 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0015-CVE-2022-4285.patch | |||
| @@ -0,0 +1,37 @@ | |||
| 1 | From 5c831a3c7f3ca98d6aba1200353311e1a1f84c70 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Nick Clifton <nickc@redhat.com> | ||
| 3 | Date: Wed, 19 Oct 2022 15:09:12 +0100 | ||
| 4 | Subject: [PATCH] Fix an illegal memory access when parsing an ELF file | ||
| 5 | containing corrupt symbol version information. | ||
| 6 | |||
| 7 | PR 29699 | ||
| 8 | * elf.c (_bfd_elf_slurp_version_tables): Fail if the sh_info field | ||
| 9 | of the section header is zero. | ||
| 10 | |||
| 11 | Upstream-Status: Backport | ||
| 12 | [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70] | ||
| 13 | |||
| 14 | Signed-off-by: Pgowda <pgowda.cve@gmail.com> | ||
| 15 | --- | ||
| 16 | bfd/ChangeLog | 6 ++++++ | ||
| 17 | bfd/elf.c | 4 +++- | ||
| 18 | 2 files changed, 9 insertions(+), 1 deletion(-) | ||
| 19 | |||
| 20 | diff --git a/bfd/elf.c b/bfd/elf.c | ||
| 21 | index fe00e0f9189..7cd7febcf95 100644 | ||
| 22 | --- a/bfd/elf.c | ||
| 23 | +++ b/bfd/elf.c | ||
| 24 | @@ -8918,7 +8918,9 @@ _bfd_elf_slurp_version_tables (bfd *abfd, bool default_imported_symver) | ||
| 25 | bfd_set_error (bfd_error_file_too_big); | ||
| 26 | goto error_return_verref; | ||
| 27 | } | ||
| 28 | - elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt); | ||
| 29 | + if (amt == 0) | ||
| 30 | + goto error_return_verref; | ||
| 31 | + elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_zalloc (abfd, amt); | ||
| 32 | if (elf_tdata (abfd)->verref == NULL) | ||
| 33 | goto error_return_verref; | ||
| 34 | |||
| 35 | -- | ||
| 36 | 2.31.1 | ||
| 37 | |||
