diff options
author | A. Wilcox <AWilcox@Wilcox-Tech.com> | 2023-09-22 23:51:50 -0500 |
---|---|---|
committer | A. Wilcox <AWilcox@Wilcox-Tech.com> | 2023-10-03 21:56:52 -0500 |
commit | 2c9ea8d0ea3c4510b5a4c9314c84c4444c933726 (patch) | |
tree | 856b85bc2e61dd819f3e9a77d2331338cf290561 /system/binutils/CVE-2019-14444.patch | |
parent | b7807f42fbd231b0783eb0d26fd60b63153ca6d9 (diff) | |
download | packages-2c9ea8d0ea3c4510b5a4c9314c84c4444c933726.tar.gz packages-2c9ea8d0ea3c4510b5a4c9314c84c4444c933726.tar.bz2 packages-2c9ea8d0ea3c4510b5a4c9314c84c4444c933726.tar.xz packages-2c9ea8d0ea3c4510b5a4c9314c84c4444c933726.zip |
system/binutils: Update to 2.41
* Vastly updated with significant features and target support.
* All tests are enabled now and passing!
Note: ARMv7 tests require the commit directly before this to be applied
to system/gcc.
Fixes: #652, #668, #1070
Diffstat (limited to 'system/binutils/CVE-2019-14444.patch')
-rw-r--r-- | system/binutils/CVE-2019-14444.patch | 28 |
1 files changed, 0 insertions, 28 deletions
diff --git a/system/binutils/CVE-2019-14444.patch b/system/binutils/CVE-2019-14444.patch deleted file mode 100644 index 43d4e2a91..000000000 --- a/system/binutils/CVE-2019-14444.patch +++ /dev/null @@ -1,28 +0,0 @@ -From e17869db99195849826eaaf5d2d0eb2cfdd7a2a7 Mon Sep 17 00:00:00 2001 -From: Nick Clifton <nickc@redhat.com> -Date: Mon, 5 Aug 2019 10:40:35 +0100 -Subject: [PATCH] Catch potential integer overflow in readelf when processing - corrupt binaries. - - PR 24829 - * readelf.c (apply_relocations): Catch potential integer overflow - whilst checking reloc location against section size. ---- - binutils/readelf.c | 2 +- - -diff --git a/binutils/readelf.c b/binutils/readelf.c -index b896ad9..e785fde 100644 ---- a/binutils/readelf.c -+++ b/binutils/readelf.c -@@ -13366,7 +13366,7 @@ apply_relocations (Filedata * filedata, - } - - rloc = start + rp->r_offset; -- if ((rloc + reloc_size) > end || (rloc < start)) -+ if (rloc >= end || (rloc + reloc_size) > end || (rloc < start)) - { - warn (_("skipping invalid relocation offset 0x%lx in section %s\n"), - (unsigned long) rp->r_offset, --- -2.9.3 - |