blob: 817a3f017668d029b1179b77663609dc48f588bb (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
|
commit 4f3ca05b487e9755018b4c9a053a2e6c35d8a7df
Author: Nick Clifton <nickc@redhat.com>
Date: Tue Dec 6 16:53:57 2016 +0000
Fix seg-fault in strip when copying a corrupt binary.
PR binutils/20931
* elf.c (copy_special_section_fields): Check for an invalid
sh_link field before attempting to follow it.
Upstream-Status: Backport
CVE: CVE-2017-7304
Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Index: git/bfd/ChangeLog
===================================================================
--- git.orig/bfd/ChangeLog 2017-09-04 16:13:03.512095249 +0530
+++ git/bfd/ChangeLog 2017-09-04 16:16:25.173745111 +0530
@@ -114,6 +114,12 @@
(bfd_elf_final_link): Only initialize the extended symbol index
section if there are extended symbol tables to list.
+ 2016-12-06 Nick Clifton <nickc@redhat.com>
+
+ PR binutils/20931
+ * elf.c (copy_special_section_fields): Check for an invalid
+ sh_link field before attempting to follow it.
+
2016-12-05 Nick Clifton <nickc@redhat.com>
PR binutils/20905
Index: git/bfd/elf.c
===================================================================
--- git.orig/bfd/elf.c 2017-09-04 16:13:03.512095249 +0530
+++ git/bfd/elf.c 2017-09-04 16:15:38.257359045 +0530
@@ -1324,6 +1324,16 @@
in the input bfd. */
if (iheader->sh_link != SHN_UNDEF)
{
+ /* See PR 20931 for a reproducer. */
+ if (iheader->sh_link >= elf_numsections (ibfd))
+ {
+ (* _bfd_error_handler)
+ /* xgettext:c-format */
+ (_("%B: Invalid sh_link field (%d) in section number %d"),
+ ibfd, iheader->sh_link, secnum);
+ return FALSE;
+ }
+
sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
if (sh_link != SHN_UNDEF)
{
|