From patchwork Tue Oct 28 11:10:09 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yash Shinde X-Patchwork-Id: 73168 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B7FF0CCF9E0 for ; Tue, 28 Oct 2025 11:10:47 +0000 (UTC) Received: from mx0b-0064b401.pphosted.com (mx0b-0064b401.pphosted.com [205.220.178.238]) by mx.groups.io with SMTP id smtpd.web10.8705.1761649845859839249 for ; Tue, 28 Oct 2025 04:10:46 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@windriver.com header.s=PPS06212021 header.b=UUt143NI; spf=permerror, err=parse error for token &{10 18 %{ir}.%{v}.%{d}.spf.has.pphosted.com}: invalid domain name (domain: windriver.com, ip: 205.220.178.238, mailfrom: prvs=33963afc6a=yash.shinde@windriver.com) Received: from pps.filterd (m0250811.ppops.net [127.0.0.1]) by mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 59SA1YeE981122 for ; Tue, 28 Oct 2025 11:10:44 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com; h=cc:content-transfer-encoding:content-type:date:from :message-id:mime-version:subject:to; s=PPS06212021; bh=wTab8NlLz LdVkezjbyUjkakP45Z4VxdeGv0rmfXL5vg=; b=UUt143NIKffUkhPll1OFT/T7Y Xm/bIgvmQWQIsYS+6tAtUMfuSELQD5Ly+UyQNO3ALPoe/dTjo+FwH0fUSWoulcC9 1KgNzf8obwLLQ3am98jOQIGBxMh6EpE8/GFI5BznuMwmKsCjmU+S0SCuDQTyBbfP ik+Eh0/q7gQTkC1F2yutCo5XT8WuKXzZnJpI4kGIOdM0BaYLE3N0Db0UrS8ywByl mcvj4cMdXaL8fCKNxsuutjHiVXOg2aNSkjvL0DhTUcOVjRbqPYtPNcGKZQxrj3+A 1V773K4AcShPp4gaRokn2XWa/2fuLQZwFJdV0cUTlrykIKifnNbdqITSF1yRw== Received: from ph7pr06cu001.outbound.protection.outlook.com (mail-westus3azon11010056.outbound.protection.outlook.com [52.101.201.56]) by mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4a0ks034s6-1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Tue, 28 Oct 2025 11:10:44 +0000 (GMT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=IZQvGHjhqShbWRb1wvPqV2B7w5T/wQOfEonJWTPaBQT26UGHUYpdfwTHcyYDCnlCbhpjoi8SW/6M11nUktAZk1UOwG2nn2HNLob56hpA/vByIFRz5HVFKexkMLaDNvlZ1ss5LWHC5/JewucwNfqwdadyGjsjuyeicV5qmT/G5gfQhGRczCXeAmQBG7Krl9KUKt9c7wTpFuUjQRRaOR1mXFo858gRhHFXQ9AmAdmLcglLCmEUes3oEtthjCY3/WK67hEmdCkHJQAB1CQwOOUjKfhtQoiwC+Uem3F3pfNS8AkGlAAtaTuGLVQ7UP/m+3hOkyP23f9Xh+QHhNZbVROINA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=wTab8NlLzLdVkezjbyUjkakP45Z4VxdeGv0rmfXL5vg=; b=ioKuws+fsX6EYq3/g53foghW/7CIE+fM6CJgs9G/Duq29dTDa7lMuuZgR+IHEuaaekNupCF8/ZAVcHLZlNpM17H3tWOcAL/mBq08SETo5qgsJmLo/ZEM7Yqh63e9FRaacB7dKMR/flgRfoPgFiv//CFGZ/GXWy22m6FDLFV76dIwU31HUtkxQTkGjdx85wqo29G5cMKzRhKkt6H+O+mUUp7l8T0cfnDSL9MVVQHGG9LcemNX/nha4WAtNImBdPRD4/Nx2nngxt/aZX/xoleTfavjNxHvQE5riczCnuSRmfeu1JzjCeuFh263ChB+6cetfFIIyDmVTrh5J0NQ1MODKQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=windriver.com; dmarc=pass action=none header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none Received: from PH7PR11MB7593.namprd11.prod.outlook.com (2603:10b6:510:27f::9) by CY8PR11MB7827.namprd11.prod.outlook.com (2603:10b6:930:77::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9253.18; Tue, 28 Oct 2025 11:10:41 +0000 Received: from PH7PR11MB7593.namprd11.prod.outlook.com ([fe80::2688:e731:421b:5ebc]) by PH7PR11MB7593.namprd11.prod.outlook.com ([fe80::2688:e731:421b:5ebc%5]) with mapi id 15.20.9228.016; Tue, 28 Oct 2025 11:10:40 +0000 From: Yash.Shinde@windriver.com To: openembedded-core@lists.openembedded.org Cc: steve@sakoman.com, Randy.MacLeod@windriver.com, Sundeep.Kokkonda@windriver.com, Yash.Shinde@windriver.com Subject: [kirkstone][PATCH 1/2] binutils: fix CVE-2025-11081 Date: Tue, 28 Oct 2025 04:10:09 -0700 Message-ID: <20251028111010.3862497-1-Yash.Shinde@windriver.com> X-Mailer: git-send-email 2.49.0 X-ClientProxiedBy: SJ0PR03CA0281.namprd03.prod.outlook.com (2603:10b6:a03:39e::16) To PH7PR11MB7593.namprd11.prod.outlook.com (2603:10b6:510:27f::9) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PH7PR11MB7593:EE_|CY8PR11MB7827:EE_ X-MS-Office365-Filtering-Correlation-Id: c7eee1fb-c3f0-4e3f-7974-08de1612a17c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|52116014|376014|366016|1800799024|13003099007|38350700014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH7PR11MB7593.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(52116014)(376014)(366016)(1800799024)(13003099007)(38350700014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: windriver.com X-MS-Exchange-CrossTenant-Network-Message-Id: c7eee1fb-c3f0-4e3f-7974-08de1612a17c X-MS-Exchange-CrossTenant-AuthSource: PH7PR11MB7593.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Oct 2025 11:10:40.9024 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 8ddb2873-a1ad-4a18-ae4e-4644631433be X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: y4cjvY7fum65KFy3UBZOhC7CbnKkQqvl/rQKW7aGWqX1GxKTnQRuyAfrpjRBwKfGKEXAY6MW9qukqMbPI/6ywZciyAHKYehs9Fou9Q2WgOU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY8PR11MB7827 X-Proofpoint-Reinject: loops=2 maxloops=12 X-Proofpoint-GUID: M0s43PVGv2CA2gr5D1c7LWKimzrxDprb X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMDI4MDA5NCBTYWx0ZWRfXwmmGtlvE/mO1 9JGinHGthdU3rTJ5XWNBCqyFjgz848mNwG3vbPMHt0adEsSMSA2AtjovFugthgtZ/DPYk52FyPe QvMHtFUN5a1/QSpDbmKSgn2xSq1K8PJKZPmlLvgXCtafAVDkKQzm4DmlxZSPHca9Oof9UXUdjvM RCaL2INsptybQEc21ThJbUucpAIlE38aLO9lnQH0MQK+QZ8BRxmEmsMwi3xoB0w0Tb2HSHn6IF5 RFsG9wAIzX++uZjVaQYypl+pbe11YQAxr0UFG5YkkoKh8/tIa8DXhIJga9VBKEvfoIuEb7tVLWn 2mPP89yxuV8Ji2aAFrunYjZ9cs87wcdg0yDF9LQls/XLLzjfnwGlh+7ADfBdgldNDFh1a10JsWD vGpc1TtHt99+Xgm+kqu7COHTe3ZYgw== X-Authority-Analysis: v=2.4 cv=CIknnBrD c=1 sm=1 tr=0 ts=6900a4b4 cx=c_pps a=wszTalFPv2ofqEyTcV7qHQ==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=xqWC_Br6kY4A:10 a=x6icFKpwvdMA:10 a=VkNPw1HP01LnGYTKEx00:22 a=CCpqsmhAAAAA:8 a=t7CeM3EgAAAA:8 a=pGLkceISAAAA:8 a=G8xoJTEVNainHG8ybTEA:9 a=ul9cdbp4aOFLsgKbc677:22 a=FdTzh2GWekK77mhwV6Dw:22 X-Proofpoint-ORIG-GUID: vxh8KWUpNcOwZpBbuZ6U3nI-rx5sfIE9 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-10-28_04,2025-10-22_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 clxscore=1015 priorityscore=1501 impostorscore=0 lowpriorityscore=0 bulkscore=0 suspectscore=0 phishscore=0 adultscore=0 spamscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2510020000 definitions=main-2510280094 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 28 Oct 2025 11:10:47 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225394 From: Yash Shinde CVE: CVE-2025-11081 Trying to dump .sframe in a PE file results in a segfault accessing elf_section_data. * objdump (dump_sframe_section, dump_dwarf_section): Don't access elf_section_type without first checking the file is ELF. PR 33406 SEGV in dump_dwarf_section [https://sourceware.org/bugzilla/show_bug.cgi?id=33406] Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b] Signed-off-by: Yash Shinde --- .../binutils/binutils-2.38.inc | 1 + .../binutils/0046-CVE-2025-11081.patch | 84 +++++++++++++++++++ 2 files changed, 85 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/0046-CVE-2025-11081.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.38.inc b/meta/recipes-devtools/binutils/binutils-2.38.inc index 2e978edc6f..2444a304be 100644 --- a/meta/recipes-devtools/binutils/binutils-2.38.inc +++ b/meta/recipes-devtools/binutils/binutils-2.38.inc @@ -82,5 +82,6 @@ SRC_URI = "\ file://0043-CVE-2025-7545.patch \ file://0044-CVE-2025-11082.patch \ file://0045-CVE-2025-11083.patch \ + file://0046-CVE-2025-11081.patch \ " S = "${WORKDIR}/git" diff --git a/meta/recipes-devtools/binutils/binutils/0046-CVE-2025-11081.patch b/meta/recipes-devtools/binutils/binutils/0046-CVE-2025-11081.patch new file mode 100644 index 0000000000..31dbef52fa --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0046-CVE-2025-11081.patch @@ -0,0 +1,84 @@ +From f87a66db645caf8cc0e6fc87b0c28c78a38af59b Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Tue, 9 Sep 2025 18:32:09 +0930 +Subject: [PATCH] PR 33406 SEGV in dump_dwarf_section + +Trying to dump .sframe in a PE file results in a segfault accessing +elf_section_data. + + * objdump (dump_sframe_section, dump_dwarf_section): Don't access + elf_section_type without first checking the file is ELF. +--- + binutils/objdump.c | 10 ++++++---- + 1 file changed, 6 insertions(+), 4 deletions(-) + +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b] +CVE: CVE-2025-11081 + +Signed-off-by: Alan Modra +Signed-off-by: Yash Shinde + +diff --git a/binutils/objdump.c b/binutils/objdump.c +index 290f7e51f66..ee8823da05a 100644 +--- a/binutils/objdump.c ++++ b/binutils/objdump.c +@@ -4418,6 +4418,10 @@ + else + match = name; + ++ if (bfd_get_flavour (abfd) == bfd_target_elf_flavour ++ && elf_section_type (section) == SHT_GNU_SFRAME) ++ match = ".sframe"; ++ + for (i = 0; i < max; i++) + if ((strcmp (debug_displays [i].section.uncompressed_name, match) == 0 + || strcmp (debug_displays [i].section.compressed_name, match) == 0 +@@ -4923,6 +4927,36 @@ + } + ++static void ++dump_sframe_section (bfd *abfd, const char *sect_name, bool is_mainfile) ++ ++{ ++ /* Error checking for user provided SFrame section name, if any. */ ++ if (sect_name) ++ { ++ asection *sec = bfd_get_section_by_name (abfd, sect_name); ++ if (sec == NULL) ++ { ++ printf (_("No %s section present\n\n"), sanitize_string (sect_name)); ++ return; ++ } ++ /* Starting with Binutils 2.45, SFrame sections have section type ++ SHT_GNU_SFRAME. For SFrame sections from Binutils 2.44 or earlier, ++ check explcitly for SFrame sections of type SHT_PROGBITS and name ++ ".sframe" to allow them. */ ++ else if (bfd_get_flavour (abfd) != bfd_target_elf_flavour ++ || (elf_section_type (sec) != SHT_GNU_SFRAME ++ && !(elf_section_type (sec) == SHT_PROGBITS ++ && strcmp (sect_name, ".sframe") == 0))) ++ { ++ printf (_("Section %s does not contain SFrame data\n\n"), ++ sanitize_string (sect_name)); ++ return; ++ } ++ } ++ dump_dwarf (abfd, is_mainfile); ++} ++ + static void + dump_target_specific (bfd *abfd) + { + const struct objdump_private_desc * const *desc; +diff --git a/include/elf/common.h b/include/elf/common.h +--- a/include/elf/common.h ++++ b/include/elf/common.h +@@ -528,6 +528,8 @@ + #define SHT_LOOS 0x60000000 /* First of OS specific semantics */ + #define SHT_HIOS 0x6fffffff /* Last of OS specific semantics */ + ++#define SHT_GNU_SFRAME 0x6ffffff4 /* SFrame stack trace information. */ ++ + #define SHT_GNU_INCREMENTAL_INPUTS 0x6fff4700 /* incremental build data */ + #define SHT_GNU_ATTRIBUTES 0x6ffffff5 /* Object attributes */ + #define SHT_GNU_HASH 0x6ffffff6 /* GNU style symbol hash table */ From patchwork Tue Oct 28 11:10:10 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yash Shinde X-Patchwork-Id: 73169 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A10E2CCF9E0 for ; Tue, 28 Oct 2025 11:10:57 +0000 (UTC) Received: from mx0b-0064b401.pphosted.com (mx0b-0064b401.pphosted.com [205.220.178.238]) by mx.groups.io with SMTP id smtpd.web10.8708.1761649855679888050 for ; Tue, 28 Oct 2025 04:10:55 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@windriver.com header.s=PPS06212021 header.b=E7gmKH4l; spf=permerror, err=parse error for token &{10 18 %{ir}.%{v}.%{d}.spf.has.pphosted.com}: invalid domain name (domain: windriver.com, ip: 205.220.178.238, mailfrom: prvs=33963afc6a=yash.shinde@windriver.com) Received: from pps.filterd (m0250812.ppops.net [127.0.0.1]) by mx0a-0064b401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 59SA1lc9057642 for ; Tue, 28 Oct 2025 11:10:54 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=windriver.com; h=cc:content-transfer-encoding:content-type:date:from :in-reply-to:message-id:mime-version:references:subject:to; s= PPS06212021; bh=dHY8F19lznz4iCW1Ro1ZZffBPsflU8IIVQFy8V2VJK8=; b= E7gmKH4l6HL+puuZ3lmpgREOFIWEUMD5aZHqj4lDDL3hL12pnOJgPNCQwE/j1CK7 53k9WLP8VCtqUm7Xa/c/ylw8PqjNOJgnYL4fjzT59tduCq7zi22w7HpYX4AsCgAq c9bsYtDR8T1fZc8AfVAZyiXl+zecTvQIRRs9/ttCs1+E5j7JSzIEevUhlKxQemQK NjcszIwOtVNb6lxNWKMZyIMSvFklFSPIdTslTysiaEDERLqkrrb+b9w0ry49J7pq Oxxh06YxOeulpQC/J5Vj97efQaBsWV4YNORP2eGSOQWkqN/xramw2ps3Lyhsuy/E oSrIv5tkBtxRJox7Bj47qg== Received: from byapr05cu005.outbound.protection.outlook.com (mail-westusazon11010029.outbound.protection.outlook.com [52.101.85.29]) by mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 4a0nh5u30t-1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Tue, 28 Oct 2025 11:10:54 +0000 (GMT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ruYtkNHUOv4VcF7qvuhe5qHpaOyYpzzdb4Ig1d+xOU2+8g1otEMDTpsAMHklKc0lMHjgx8ti/kHXDoe5Z59cijfgu4eVcJsiUVq9un4TCqe7efbKey6YjhS8o+oBBSI5wlwhOLep7GxYXUkFL/jS3aCUBmDLv2w8yhLYO7n7ShhpR4xxV3MrMiDRIX34Gdt5HivQ6pRWNkqyW6JFzTdF0ZYjUk3mNWQxF/UdrWD5Tuqm9stLbsyLsiZXR0nnKH/zJywgt/fwn9hoATG3Zo30HdpIRTFwtNpjjct956wf90D69VC5Xxrk8vOV9L73WrsYrE/kMgE5GmfG5HNQ4sXJ+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dHY8F19lznz4iCW1Ro1ZZffBPsflU8IIVQFy8V2VJK8=; b=qsLniYo6Y6rvBuUZWyQPMFp3mVZY9/xZKm8iITbycmxCTv3iJLZkZ02nCTC6sPm3CM/t7EFqXzcxEnLZE33hxShDOlLMogRdgq0ot63fU4Mi1YmRixszj2LCRj48krQaZ8j5Odm3NzyBYQN0kKYBKLrfhGfoqDIsuou1/OkDAvKAyRnS0BBX9XXey60AbzWij5moM7QYvD2H7k4utj1zjIq3g8dXoG0wVr2JIpBO+xudcZ2ElH5p34EG1j2vQWDhg4p4r/q1ojq9EMxwiZu5ma3OQL+G1lbkNMlzSVXC3MtP4SXTERl77Y0zZcr25aoix5kZoyeH9SyifNJIPl50fQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=windriver.com; dmarc=pass action=none header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none Received: from PH7PR11MB7593.namprd11.prod.outlook.com (2603:10b6:510:27f::9) by CY8PR11MB7827.namprd11.prod.outlook.com (2603:10b6:930:77::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9253.18; Tue, 28 Oct 2025 11:10:52 +0000 Received: from PH7PR11MB7593.namprd11.prod.outlook.com ([fe80::2688:e731:421b:5ebc]) by PH7PR11MB7593.namprd11.prod.outlook.com ([fe80::2688:e731:421b:5ebc%5]) with mapi id 15.20.9228.016; Tue, 28 Oct 2025 11:10:51 +0000 From: Yash.Shinde@windriver.com To: openembedded-core@lists.openembedded.org Cc: steve@sakoman.com, Randy.MacLeod@windriver.com, Sundeep.Kokkonda@windriver.com, Yash.Shinde@windriver.com Subject: [kirkstone][PATCH 2/2] binutils: fix CVE-2025-8225 Date: Tue, 28 Oct 2025 04:10:10 -0700 Message-ID: <20251028111010.3862497-2-Yash.Shinde@windriver.com> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20251028111010.3862497-1-Yash.Shinde@windriver.com> References: <20251028111010.3862497-1-Yash.Shinde@windriver.com> X-ClientProxiedBy: SJ0PR03CA0281.namprd03.prod.outlook.com (2603:10b6:a03:39e::16) To PH7PR11MB7593.namprd11.prod.outlook.com (2603:10b6:510:27f::9) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PH7PR11MB7593:EE_|CY8PR11MB7827:EE_ X-MS-Office365-Filtering-Correlation-Id: c4f1bf06-4d45-4f77-24d3-08de1612a7ad X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|52116014|376014|366016|1800799024|13003099007|38350700014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH7PR11MB7593.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(52116014)(376014)(366016)(1800799024)(13003099007)(38350700014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: windriver.com X-MS-Exchange-CrossTenant-Network-Message-Id: c4f1bf06-4d45-4f77-24d3-08de1612a7ad X-MS-Exchange-CrossTenant-AuthSource: PH7PR11MB7593.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Oct 2025 11:10:51.2759 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 8ddb2873-a1ad-4a18-ae4e-4644631433be X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: gxhrzsmesW0b4Bd5B0lmp4622odm+zYZX4DvUxlcxageG7ksgJ7RTZjrcGYV+av04vXJpfEdRsSvsnqyw86iAMxct637WtW+Ug6QKe1RMsg= X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY8PR11MB7827 X-Proofpoint-Reinject: loops=2 maxloops=12 X-Proofpoint-GUID: sh3knB_G8heoW-7gTl1tl6PN6jeJ5WfQ X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMDI4MDA5NCBTYWx0ZWRfX5rkL3z2mZnhL 9jrNtUhWR5Dl8wiF6DiPqvA83JGOskPjg0Oet8lvFCvQL+PuJW5R+U9lEr/awu2c1aqhRU0XY1h XYAjdlof/M1K/LsWKpIXgPIlwD9HicPZ1hCMEO2y2keIMI1JIhtrK7vivMYUlVfoPkBSbnz5SSh ityXwFQjvdYjEPQSB4HBWWkaJvbl2U/MC92XbyMjeVERF6LLYHJDNPSTnbtNrtIm8Sw766pBA7r qcsZVE+DG+Xv16aFHZ/1yUEwaSpVS9PsObxhwlt6OgUU/tke5nkTpKLAnfMM3Sv21Dg7VXsZ+X0 2T3KXdsHZ43PPXy6Zo5HfbNwhgXwyRVvbQtoNC/o3E6+u8rclHc1/ChhoFgM1rJrx08Usl7MI7+ DWOTGQzhGgATU5hvRMwcpW8+1NkBcA== X-Authority-Analysis: v=2.4 cv=FOoWBuos c=1 sm=1 tr=0 ts=6900a4be cx=c_pps a=wUQTFLLo3/oASVCpA6ZfNQ==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=xqWC_Br6kY4A:10 a=x6icFKpwvdMA:10 a=VkNPw1HP01LnGYTKEx00:22 a=CCpqsmhAAAAA:8 a=t7CeM3EgAAAA:8 a=pGLkceISAAAA:8 a=i8IGbyu1qK8S-DYGAGwA:9 a=ul9cdbp4aOFLsgKbc677:22 a=FdTzh2GWekK77mhwV6Dw:22 X-Proofpoint-ORIG-GUID: SKmpl_OzjNSTc4q8Wl6wEUiSF3i-TDSx X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-10-28_04,2025-10-22_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 adultscore=0 suspectscore=0 lowpriorityscore=0 phishscore=0 malwarescore=0 clxscore=1015 spamscore=0 priorityscore=1501 bulkscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2510020000 definitions=main-2510280094 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 28 Oct 2025 11:10:57 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225395 From: Yash Shinde CVE: CVE-2025-8225 It is possible with fuzzed files to have num_debug_info_entries zero after allocating space for debug_information, leading to multiple allocations. * dwarf.c (process_debug_info): Don't test num_debug_info_entries to determine whether debug_information has been allocated, test alloc_num_debug_info_entries. Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4] Signed-off-by: Yash Shinde --- .../binutils/binutils-2.38.inc | 1 + .../binutils/0047-CVE-2025-8225.patch | 47 +++++++++++++++++++ 2 files changed, 48 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/0047-CVE-2025-8225.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.38.inc b/meta/recipes-devtools/binutils/binutils-2.38.inc index 2444a304be..ade69881a1 100644 --- a/meta/recipes-devtools/binutils/binutils-2.38.inc +++ b/meta/recipes-devtools/binutils/binutils-2.38.inc @@ -83,5 +83,6 @@ SRC_URI = "\ file://0044-CVE-2025-11082.patch \ file://0045-CVE-2025-11083.patch \ file://0046-CVE-2025-11081.patch \ + file://0047-CVE-2025-8225.patch \ " S = "${WORKDIR}/git" diff --git a/meta/recipes-devtools/binutils/binutils/0047-CVE-2025-8225.patch b/meta/recipes-devtools/binutils/binutils/0047-CVE-2025-8225.patch new file mode 100644 index 0000000000..410ba64143 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0047-CVE-2025-8225.patch @@ -0,0 +1,47 @@ +From e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4 Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Wed, 19 Feb 2025 22:45:29 +1030 +Subject: [PATCH] binutils/dwarf.c debug_information leak + +It is possible with fuzzed files to have num_debug_info_entries zero +after allocating space for debug_information, leading to multiple +allocations. + + * dwarf.c (process_debug_info): Don't test num_debug_info_entries + to determine whether debug_information has been allocated, + test alloc_num_debug_info_entries. +--- + +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4] +CVE: CVE-2025-8225 + + binutils/dwarf.c | 8 +++----- + 1 file changed, 3 insertions(+), 5 deletions(-) + +Signed-off-by: Alan Modra +Signed-off-by: Yash Shinde + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index 8e004cea839..bfbf83ec9f4 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -3807,13 +3807,11 @@ process_debug_info (struct dwarf_section * section, + } + + if ((do_loc || do_debug_loc || do_debug_ranges || do_debug_info) +- && num_debug_info_entries == 0 +- && ! do_types) ++ && alloc_num_debug_info_entries == 0 ++ && !do_types) + { +- + /* Then allocate an array to hold the information. */ +- debug_information = (debug_info *) cmalloc (num_units, +- sizeof (* debug_information)); ++ debug_information = cmalloc (num_units, sizeof (*debug_information)); + if (debug_information == NULL) + { + error (_("Not enough memory for a debug info array of %u entries\n"), +-- +2.43.7 +