diff options
| -rw-r--r-- | meta/recipes-devtools/binutils/binutils-2.44.inc | 1 | ||||
| -rw-r--r-- | meta/recipes-devtools/binutils/binutils/0018-CVE-2025-7546.patch | 58 |
2 files changed, 59 insertions, 0 deletions
diff --git a/meta/recipes-devtools/binutils/binutils-2.44.inc b/meta/recipes-devtools/binutils/binutils-2.44.inc index 8a26fe76f1..32928ee167 100644 --- a/meta/recipes-devtools/binutils/binutils-2.44.inc +++ b/meta/recipes-devtools/binutils/binutils-2.44.inc | |||
| @@ -44,5 +44,6 @@ SRC_URI = "\ | |||
| 44 | file://0016-CVE-2025-3198.patch \ | 44 | file://0016-CVE-2025-3198.patch \ |
| 45 | file://0018-CVE-2025-5245.patch \ | 45 | file://0018-CVE-2025-5245.patch \ |
| 46 | file://0019-CVE-2025-7545.patch \ | 46 | file://0019-CVE-2025-7545.patch \ |
| 47 | file://0018-CVE-2025-7546.patch \ | ||
| 47 | " | 48 | " |
| 48 | S = "${WORKDIR}/git" | 49 | S = "${WORKDIR}/git" |
diff --git a/meta/recipes-devtools/binutils/binutils/0018-CVE-2025-7546.patch b/meta/recipes-devtools/binutils/binutils/0018-CVE-2025-7546.patch new file mode 100644 index 0000000000..23c38091a2 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0018-CVE-2025-7546.patch | |||
| @@ -0,0 +1,58 @@ | |||
| 1 | From 41461010eb7c79fee7a9d5f6209accdaac66cc6b Mon Sep 17 00:00:00 2001 | ||
| 2 | From: "H.J. Lu" <hjl.tools@gmail.com> | ||
| 3 | Date: Sat, 21 Jun 2025 06:52:00 +0800 | ||
| 4 | Subject: [PATCH] elf: Report corrupted group section | ||
| 5 | |||
| 6 | Report corrupted group section instead of trying to recover. | ||
| 7 | |||
| 8 | PR binutils/33050 | ||
| 9 | * elf.c (bfd_elf_set_group_contents): Report corrupted group | ||
| 10 | section. | ||
| 11 | |||
| 12 | Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b] | ||
| 13 | CVE: CVE-2025-7546 | ||
| 14 | |||
| 15 | Signed-off-by: H.J. Lu <hjl.tools@gmail.com> | ||
| 16 | Signed-off-by: Yash Shinde <Yash.Shinde@windriver.com> | ||
| 17 | --- | ||
| 18 | bfd/elf.c | 23 ++++++++++------------- | ||
| 19 | 1 file changed, 10 insertions(+), 13 deletions(-) | ||
| 20 | |||
| 21 | diff --git a/bfd/elf.c b/bfd/elf.c | ||
| 22 | index 14ce15c7254..ee894eb05f2 100644 | ||
| 23 | --- a/bfd/elf.c | ||
| 24 | +++ b/bfd/elf.c | ||
| 25 | @@ -3971,20 +3971,17 @@ bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg) | ||
| 26 | break; | ||
| 27 | } | ||
| 28 | |||
| 29 | - /* We should always get here with loc == sec->contents + 4, but it is | ||
| 30 | - possible to craft bogus SHT_GROUP sections that will cause segfaults | ||
| 31 | - in objcopy without checking loc here and in the loop above. */ | ||
| 32 | - if (loc == sec->contents) | ||
| 33 | - BFD_ASSERT (0); | ||
| 34 | - else | ||
| 35 | + /* We should always get here with loc == sec->contents + 4. Return | ||
| 36 | + an error for bogus SHT_GROUP sections. */ | ||
| 37 | + loc -= 4; | ||
| 38 | + if (loc != sec->contents) | ||
| 39 | { | ||
| 40 | - loc -= 4; | ||
| 41 | - if (loc != sec->contents) | ||
| 42 | - { | ||
| 43 | - BFD_ASSERT (0); | ||
| 44 | - memset (sec->contents + 4, 0, loc - sec->contents); | ||
| 45 | - loc = sec->contents; | ||
| 46 | - } | ||
| 47 | + /* xgettext:c-format */ | ||
| 48 | + _bfd_error_handler (_("%pB: corrupted group section: `%pA'"), | ||
| 49 | + abfd, sec); | ||
| 50 | + bfd_set_error (bfd_error_bad_value); | ||
| 51 | + *failedptr = true; | ||
| 52 | + return; | ||
| 53 | } | ||
| 54 | |||
| 55 | H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc); | ||
| 56 | -- | ||
| 57 | 2.43.5 | ||
| 58 | |||
