mirror of
git://git.yoctoproject.org/poky.git
synced 2025-07-19 12:59:02 +02:00
binutils: Fix CVE-2025-1182
Upstream-Status: Submitted [https://sourceware.org/pipermail/binutils/2025-May/141415.html] CVE: CVE-2025-1182 (From OE-Core rev: 1e6575a4eb6168322a6560af787399267f5fa304) Signed-off-by: Harish Sadineni <Harish.Sadineni@windriver.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
parent
e67506ffa2
commit
4c29d2543f
|
@ -37,5 +37,6 @@ SRC_URI = "\
|
|||
file://0014-Remove-duplicate-pe-dll.o-entry-deom-targ_extra_ofil.patch \
|
||||
file://0015-CVE-2025-1178.patch \
|
||||
file://CVE-2025-1180.patch \
|
||||
file://CVE-2025-1182.patch \
|
||||
"
|
||||
S = "${WORKDIR}/git"
|
||||
|
|
36
meta/recipes-devtools/binutils/binutils/CVE-2025-1182.patch
Normal file
36
meta/recipes-devtools/binutils/binutils/CVE-2025-1182.patch
Normal file
|
@ -0,0 +1,36 @@
|
|||
From 92bcd04fcd97f261ff40e9248e00a1dbebf3a536 Mon Sep 17 00:00:00 2001
|
||||
From: Nick Clifton <nickc@redhat.com>
|
||||
Date: Tue, 27 May 2025 03:37:50 -0700
|
||||
Subject: [PATCH] Backport fix for PR 32644(CVE-2025-1182)
|
||||
|
||||
Fix another illegal memory access triggered by corrupt ELF input files.
|
||||
|
||||
PR 32644
|
||||
|
||||
(cherry picked from commit:b425859021d17adf62f06fb904797cf8642986ad)
|
||||
Upstream-Status: Submitted [https://sourceware.org/pipermail/binutils/2025-May/141415.html]
|
||||
CVE: CVE-2025-1182
|
||||
|
||||
Signed-off-by: Harish Sadineni <Harish.Sadineni@windriver.com>
|
||||
---
|
||||
bfd/elflink.c | 4 ++++
|
||||
1 file changed, 4 insertions(+)
|
||||
|
||||
diff --git a/bfd/elflink.c b/bfd/elflink.c
|
||||
index 6346d7e2b4b..a0b237b2224 100644
|
||||
--- a/bfd/elflink.c
|
||||
+++ b/bfd/elflink.c
|
||||
@@ -15084,6 +15084,10 @@ bfd_elf_reloc_symbol_deleted_p (bfd_vma offset, void *cookie)
|
||||
}
|
||||
else
|
||||
{
|
||||
+ if (r_symndx >= rcookie->locsymcount)
|
||||
+ /* This can happen with corrupt input. */
|
||||
+ return false;
|
||||
+
|
||||
/* It's not a relocation against a global symbol,
|
||||
but it could be a relocation against a local
|
||||
symbol for a discarded section. */
|
||||
--
|
||||
2.49.0
|
||||
|
Loading…
Reference in New Issue
Block a user