summaryrefslogtreecommitdiff
path: root/system/binutils/CVE-2019-14444.patch
diff options
context:
space:
mode:
authorA. Wilcox <awilcox@wilcox-tech.com>2019-09-30 19:30:46 +0000
committerA. Wilcox <awilcox@wilcox-tech.com>2019-09-30 19:30:46 +0000
commit01e07c91e249e8f1bd88fe550de3d65c4f95c7dc (patch)
treec5df46b653c94dfc88826589697b4d109be26f42 /system/binutils/CVE-2019-14444.patch
parent693d3c8e25df7b049b330bfdc72fce50ee8e7302 (diff)
parent03714f9c021bca9fa83820d0248e16593217ad01 (diff)
downloadpackages-01e07c91e249e8f1bd88fe550de3d65c4f95c7dc.tar.gz
packages-01e07c91e249e8f1bd88fe550de3d65c4f95c7dc.tar.bz2
packages-01e07c91e249e8f1bd88fe550de3d65c4f95c7dc.tar.xz
packages-01e07c91e249e8f1bd88fe550de3d65c4f95c7dc.zip
Merge branch 'cves.2019.09.30' into 'master'
CVE patches for 2019.09.30 See merge request adelie/packages!344
Diffstat (limited to 'system/binutils/CVE-2019-14444.patch')
-rw-r--r--system/binutils/CVE-2019-14444.patch28
1 files changed, 28 insertions, 0 deletions
diff --git a/system/binutils/CVE-2019-14444.patch b/system/binutils/CVE-2019-14444.patch
new file mode 100644
index 000000000..43d4e2a91
--- /dev/null
+++ b/system/binutils/CVE-2019-14444.patch
@@ -0,0 +1,28 @@
+From e17869db99195849826eaaf5d2d0eb2cfdd7a2a7 Mon Sep 17 00:00:00 2001
+From: Nick Clifton <nickc@redhat.com>
+Date: Mon, 5 Aug 2019 10:40:35 +0100
+Subject: [PATCH] Catch potential integer overflow in readelf when processing
+ corrupt binaries.
+
+ PR 24829
+ * readelf.c (apply_relocations): Catch potential integer overflow
+ whilst checking reloc location against section size.
+---
+ binutils/readelf.c | 2 +-
+
+diff --git a/binutils/readelf.c b/binutils/readelf.c
+index b896ad9..e785fde 100644
+--- a/binutils/readelf.c
++++ b/binutils/readelf.c
+@@ -13366,7 +13366,7 @@ apply_relocations (Filedata * filedata,
+ }
+
+ rloc = start + rp->r_offset;
+- if ((rloc + reloc_size) > end || (rloc < start))
++ if (rloc >= end || (rloc + reloc_size) > end || (rloc < start))
+ {
+ warn (_("skipping invalid relocation offset 0x%lx in section %s\n"),
+ (unsigned long) rp->r_offset,
+--
+2.9.3
+