From patchwork Fri Mar 13 06:25:30 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Deepak Rathore -X (deeratho - E INFOCHIPS PRIVATE LIMITED at Cisco)" X-Patchwork-Id: 83299 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3EFCE106FD8C for ; Fri, 13 Mar 2026 06:26:21 +0000 (UTC) Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.10009.1773383164609012158 for ; Thu, 12 Mar 2026 23:26:05 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: message contains an insecure body length tag" header.i=@cisco.com header.s=iport01 header.b=EwjgJUFp; spf=pass (domain: cisco.com, ip: 173.38.203.53, mailfrom: deeratho@cisco.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=3908; q=dns/txt; s=iport01; t=1773383164; x=1774592764; h=from:to:subject:date:message-id:mime-version: content-transfer-encoding; bh=lpvAVJuj8/whJW5aC+sEmKCLc/gQo/+qJxIacby3dmY=; b=EwjgJUFpQkr12OC4XOyrzV0B6rhk6Jgv1lBhAAOfSqw/OTHaZzahvGwK TeCv2WYvr0SOMaDqXU3McVuwyzB8GjXnb/MYor0NA4Xu2QNOGXGZWXi0k /CwUW9eKmVVdQcAshM4jER7jlSxdtDNjtcAyGfWDBjbtmbcfSn57zkDtD f+7DgQbXYHE2q4+BDlBBxDA2FnbZjv1c/N7aD7qBZ2Qz8o7P/ROK7+WpS kg6Azbt8leLnTKj4fAhBq3XdEpwOrCG3TcTwrlYEFtMPpxbZltUsRSRQo jNM4cUy/1ejD7h6gzgl85gVMAr20ZyWp2b+Ccri9fee834GYSQbmFNxoa Q==; X-CSE-ConnectionGUID: LDSzqtiLTi+umMpZCKuf0w== X-CSE-MsgGUID: H7Tw2rMuTTSmgVgjZqSJDg== X-IPAS-Result: A0BzAACPrbNp/8xK/pBaHQEBAQEJARIBBQUBgWsQBggBCwGCQw9xX0JJjHOHN44IkjaBfw8BAQEPRA0EAQGSKwImNAkOAQIEAQEBAQMCAwEBAQEBAQEBAQEBAQoBAQUBAQECAQcFgQ4Thk8NhloBLQsBcgMBAk8LIxkIgwIBgjoDNgMRsmuBeTOBAYNoAkNPsikNglIBBQYUAYE4AYU7gnmFIFsYAYR6JxsbgXKCUIItgQWBGkIBAxiBHoZsBIIigQ6BYZFLSIEeA1ksAVUTDQoLBwWBZgM1EioVbjIdgSM+F4ELGwcFhRoPiHB0bYETgygDCxgNSBEsNxQbBD5uB414PYI0exMspX+CHqAgcQoog3SMHo8+hXwaM4QElBWSUguYe44JhAmSR4RogWg8gUcLB3AVgyJSGQ+OOIVogxTBFTs1AgkxAgcLAQEDCZFrgXwBAQ IronPort-Data: A9a23:Z4Wn16KTTfFnsynjFE+RapclxSXFcZb7ZxGr2PjKsXjdYENS0TZUz GEfDG6Ab/7ZM2CgL9FxYdzloUMPvZGAnIBiGwAd+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcoZpCCea/Un3WlTYhSEU/bmSQbbhA/LzNCl0RAt1IA8skhsLd9QR2uaEuvDnRVnW0 T/Oi5eHYgH9gGcuaj58B5+r8XuDgtyj4Fv0gXRmDRx7lAe2v2UYCpsZOZawIxPQKmWDNrfnL wpr5OjRElLxp3/BOPv8+lrIWhFirorpAOS7oiE+t55OLfR1jndaPq4TbJLwYKrM4tmDt4gZJ N5l7fRcReq1V0HBsLx1bvVWL81xFYlqw63ePXmbjc3Q0kjja0nH4OhgVF5jaOX0+s4vaY1P3 fUVMnUJKxuEne/zmOn9Qeh3jcNlJ87uVG8dkig8kXeDUKpgHsyFGf2WjTNb9G9YasRmEfvTf cMFaT1HZxXbaBoJMVASYH47tLrx3iikLGwGwL6TjYpo33eJ1ils7ITWNdXrdd64XP53sknN8 woq+Ey8WHn2Lue3ziKI9H+pjOLDkS73HYkVDrCQ8v9xnEbVwXQeDhATX1a3rfS1zEmkVLpix 1c88yc06Kx3/0uxQ5ylBFuzoWWPuVgXXN84//AG1TxhA5H8u26xblXohBYYADD6nKfanQAX6 2I= IronPort-HdrOrdr: A9a23:JUv+Gqkh1jYgTxcJvdIJnms3CYLpDfI53DAbv31ZSRFFG/Fw8P re/sjzuiWbtN98YhwdcLO7Scq9qA3nlKKdiLN5VdzJYOCMggSVxe9ZgbcKuweBJ8U7ndQtsZ uJtMNFebjNMWQ= X-Talos-CUID: 9a23:a18d6GpRPmjtK2PPT0I4bpzmUeQJSW/E0Hb0H077FGNMUI++akKeoLwxxg== X-Talos-MUID: 9a23:UL221gjbBQVszxCROb1ER8MpFJhU/P60LV0xra4DtPeLNx5pABWxg2Hi X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="6.23,117,1770595200"; d="scan'208";a="51093796" Received: from aer-l-core-03.cisco.com ([144.254.74.204]) by aer-iport-3.cisco.com with ESMTP/TLS/TLS_AES_256_GCM_SHA384; 13 Mar 2026 06:25:48 +0000 Received: from bgl-ads-3413.cisco.com (bgl-ads-3413.cisco.com [173.39.60.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by aer-l-core-03.cisco.com (Postfix) with ESMTPS id B83CD1800020F for ; Fri, 13 Mar 2026 06:25:47 +0000 (GMT) Received: by bgl-ads-3413.cisco.com (Postfix, from userid 1795984) id F0874CC12B5; Fri, 13 Mar 2026 11:55:45 +0530 (IST) From: "Deepak Rathore -X (deeratho - E INFOCHIPS PRIVATE LIMITED at Cisco)" To: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 1/3] binutils: CVE-2025-69644 Date: Fri, 13 Mar 2026 11:55:30 +0530 Message-Id: <20260313062532.3247430-1-deeratho@cisco.com> X-Mailer: git-send-email 2.35.6 MIME-Version: 1.0 X-Outbound-SMTP-Client: 173.39.60.50, bgl-ads-3413.cisco.com X-Outbound-Node: aer-l-core-03.cisco.com List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 13 Mar 2026 06:26:21 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/233026 From: Deepak Rathore pick the patch [1] as mentioned in [2] [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=455446bbdc8675f34808187de2bbad4682016ff7 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69644 Signed-off-by: Deepak Rathore diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 16a63cabc5..cdbe12c97f 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -46,4 +46,5 @@ SRC_URI = "\ file://0018-CVE-2025-11494.patch \ file://0019-CVE-2025-11839.patch \ file://0020-CVE-2025-11840.patch \ + file://CVE-2025-69644.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69644.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69644.patch new file mode 100644 index 0000000000..f314a4da67 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69644.patch @@ -0,0 +1,83 @@ +From ba49416855d61189ef1d8c422ad2815b8702871e Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Sat, 22 Nov 2025 09:52:18 +1030 +Subject: [PATCH] PR 33639 .debug_loclists output + +The fuzzed testcase in this PR prints an almost endless table of +offsets, due to a bogus offset count. Limit that count, and the total +length too. + + PR 33639 + * dwarf.c (display_loclists_unit_header): Return error on + length too small to read header. Limit length to section + size. Limit offset count similarly. +CVE: CVE-2025-69644 +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=455446bbdc8675f34808187de2bbad4682016ff7] + +(cherry picked from commit 455446bbdc8675f34808187de2bbad4682016ff7) +Signed-off-by: Deepak Rathore +--- + binutils/dwarf.c | 20 ++++++++++++++------ + 1 file changed, 14 insertions(+), 6 deletions(-) + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index f4bcb677761..3c53821149c 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -7257,8 +7257,6 @@ display_loclists_unit_header (struct dwarf_section * section, + bool is_64bit; + uint32_t i; + +- printf (_("Table at Offset %#" PRIx64 "\n"), header_offset); +- + SAFE_BYTE_GET_AND_INC (length, start, 4, end); + if (length == 0xffffffff) + { +@@ -7267,6 +7265,11 @@ display_loclists_unit_header (struct dwarf_section * section, + } + else + is_64bit = false; ++ if (length < 8) ++ return (uint64_t) -1; ++ ++ printf (_("Table at Offset %#" PRIx64 "\n"), header_offset); ++ header_offset = start - section->start; + + SAFE_BYTE_GET_AND_INC (version, start, 2, end); + SAFE_BYTE_GET_AND_INC (address_size, start, 1, end); +@@ -7279,15 +7282,21 @@ display_loclists_unit_header (struct dwarf_section * section, + printf (_(" Segment size: %u\n"), segment_selector_size); + printf (_(" Offset entries: %u\n"), *offset_count); + ++ if (length > section->size - header_offset) ++ length = section->size - header_offset; ++ + if (segment_selector_size != 0) + { + warn (_("The %s section contains an " + "unsupported segment selector size: %d.\n"), + section->name, segment_selector_size); +- return (uint64_t)-1; ++ return (uint64_t) -1; + } + +- if ( *offset_count) ++ uint64_t max_off_count = length >> (is_64bit ? 3 : 2); ++ if (*offset_count > max_off_count) ++ *offset_count = max_off_count; ++ if (*offset_count) + { + printf (_("\n Offset Entries starting at %#tx:\n"), + start - section->start); +@@ -7304,8 +7313,7 @@ display_loclists_unit_header (struct dwarf_section * section, + putchar ('\n'); + *loclists_start = start; + +- /* The length field doesn't include the length field itself. */ +- return header_offset + length + (is_64bit ? 12 : 4); ++ return header_offset + length; + } + + static int +-- +2.44.1 From patchwork Fri Mar 13 06:25:31 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Deepak Rathore -X (deeratho - E INFOCHIPS PRIVATE LIMITED at Cisco)" X-Patchwork-Id: 83298 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4AFC3106FD87 for ; Fri, 13 Mar 2026 06:26:21 +0000 (UTC) Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.10008.1773383164588766945 for ; Thu, 12 Mar 2026 23:26:05 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: message contains an insecure body length tag" header.i=@cisco.com header.s=iport01 header.b=Frcd91Vm; spf=pass (domain: cisco.com, ip: 173.38.203.51, mailfrom: deeratho@cisco.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=2304; q=dns/txt; s=iport01; t=1773383164; x=1774592764; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=5XHrxayg0sLFJiLbx3ftFoK7D30zowryO5L5CnuUaog=; b=Frcd91VmJpD5qh4LMvtJYbE1D58wJyhZZtXvImhi6cfW3oDALG5Lb84a r6P1OvpsTlP+cLm5vsV9jA2fsBTAvq2TtQf4DhKg+gTeY8VunPQhx8TZB 5V1XTOMZoKxCVPqTBRo+y74IjkbDz4UXXJKYuqRVeqdj4drp20AunxU1q OpKWiQ+oSWd2vIe9H7kLdacliSVeZAnECcG+zmQcSuEMwyDdIQHZ5zwu5 mQIF9PW3wfOeS3HDl5d7DD5E5OOWz3xGTmsPw7isEwlg2zAM77w3kKnEu IMm3+wlRFzq9IBExr0cMo0LaEJa29ycONp8xgGz9UKXsiA+OrtgOG470s w==; X-CSE-ConnectionGUID: mfU1LDlARzefFvS4pADhCA== X-CSE-MsgGUID: 0rVxt5NtR7yWKgm2aXVR6A== X-IPAS-Result: A0CrBgAArbNp/9JK/pBaHgEBCxIMggULgkgPcV9CSZQqgiSLZJI2gX8PAQEBD0QNBAEBhQcCjSICJjQJDgECBAEBAQEDAgMBAQEBAQEBAQEBAQsBAQUBAQECAQcFgQ4Thk8NhloBAgEDJwsBVhwDAQIvIAsjCBEIgwIBgjoDNgMRrziBeTOBAYNoAkNP2EcNglIBBQYUAYE4hTyCeYUgWxgBhHonGxuBcoEVgTuCLYEFgRpCAQMYghOFdwSCIoEOgWGRS0iBHgNZLAFVEw0KCwcFgWYDNRIqFW4yHYEjPheBCxsHBYUaD4hwdG2BE4MoAwsYDUgRLDcUGwQ+bgeNeD2CNIEOLKgdoCBxCiiDdIwejz6FfBozqmsLmHuOCYQJkkeEaIFoPIFHCwdwFYMiUhkPjjiFaIMUw2M7NQIJMQIHCwEBAwmTZwEB IronPort-Data: A9a23:GuvX7q7KeQSr3c1Bqw2N9AxRtGzGchMFZxGqfqrLsTDasY5as4F+v jdLD2mBO/bcY2P2LtkiYNzn9kwEuZ/Tmt5lGVc+rilkZn8b8sCt6fZ1gavT04J+CuWZESqLO u1HMoGowPgcFyGa/lH2dOC98RGQ7InQLpLkEunIJyttcgFtTSYlmHpLlvUw6mJSqYDR7zil5 5Wo+KUzBHf/g2QqajlNsfrZwP9SlK2aVA0w7wRWic9j5Dcyp1FNZLoDKKe4KWfPQ4U8NoaSW +bZwbilyXjS9hErB8nNuu6TnpoiG+O60aCm0xK6aoD66vRwjnVaPpUTaJLwXXxqZwChxLid/ jniWauYEm/FNoWU8AgUvoIx/ytWZcWq85efSZSzXFD6I0DuKxPRL/tS4E4eOIMlo8JbBUh05 /EWBi42Mgiqq+Kd6efuIgVsrpxLwMjDNY4F/3UlxjbDALN+ENbIQr7B4plT2zJYasJmRKqCI ZBENXwwMFKaOkUn1lQ/UPrSmM+ki3TleiFYr3qepLE85C7YywkZPL3FbYaNKozRH5s9ckCw/ nj473ikJA0ga82g6jWAqHucuNWRtHauMG4VPPjinhJwu3WU3mEVBRgcWFe3rPX8gUmkVvpbK lcI4WwptaU0+UmhQ9XxUhH+p2SL1iPwQPJZHvd/7ESGzbDZpl7IQGMFVTVGLtchsafaWAAX6 7NApPuxbRQHjVFfYSv1Gmu8xd9qBRUoEA== IronPort-HdrOrdr: A9a23:xZ93aKAJcoaR77rlHemt55DYdb4zR+YMi2TDsHoBLSC9Hfb3qy nDppkmPFrP+VUssRIb6LW90de7IE80nKQdieJ6AV7hZniFhILCFu5fBOXZrwEIYxefygaYvp 0QFZSXz7bLfD9Hsfo= X-Talos-CUID: 9a23:u9+L+GlNqJ4xf19adjRXOfzk2xPXOXjT8S70D0uRM3RkRpOLcgOI0Y9kuOM7zg== X-Talos-MUID: 9a23:ioGfUgWEAHBJ0abq/Gf2uiF+aeF02fu/N2MClM8Pi/e+awUlbg== X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="6.23,117,1770595200"; d="scan'208";a="54088326" Received: from aer-l-core-09.cisco.com ([144.254.74.210]) by aer-iport-1.cisco.com with ESMTP/TLS/TLS_AES_256_GCM_SHA384; 13 Mar 2026 06:26:01 +0000 Received: from bgl-ads-3413.cisco.com (bgl-ads-3413.cisco.com [173.39.60.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by aer-l-core-09.cisco.com (Postfix) with ESMTPS id AC0C3180001C4 for ; Fri, 13 Mar 2026 06:26:00 +0000 (GMT) Received: by bgl-ads-3413.cisco.com (Postfix, from userid 1795984) id D62FBCC12B5; Fri, 13 Mar 2026 11:55:58 +0530 (IST) From: "Deepak Rathore -X (deeratho - E INFOCHIPS PRIVATE LIMITED at Cisco)" To: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 2/3] binutils: CVE-2025-69649 Date: Fri, 13 Mar 2026 11:55:31 +0530 Message-Id: <20260313062532.3247430-2-deeratho@cisco.com> X-Mailer: git-send-email 2.35.6 In-Reply-To: <20260313062532.3247430-1-deeratho@cisco.com> References: <20260313062532.3247430-1-deeratho@cisco.com> MIME-Version: 1.0 X-Outbound-SMTP-Client: 173.39.60.50, bgl-ads-3413.cisco.com X-Outbound-Node: aer-l-core-09.cisco.com List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 13 Mar 2026 06:26:21 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/233027 From: Deepak Rathore pick the patch [1] as mentioned in [2] [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69649 Signed-off-by: Deepak Rathore diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index cdbe12c97f..ff521e1b46 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -47,4 +47,5 @@ SRC_URI = "\ file://0019-CVE-2025-11839.patch \ file://0020-CVE-2025-11840.patch \ file://CVE-2025-69644.patch \ + file://CVE-2025-69649.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch new file mode 100644 index 0000000000..bd6e577afc --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch @@ -0,0 +1,40 @@ +From afd5151c503b95ce65a492b6585e55c56aba0e75 Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Mon, 8 Dec 2025 15:58:33 +1030 +Subject: [PATCH] PR 33697, fuzzer segfault + + PR 33697 + * readelf.c (process_relocs): Don't segfault on no sections. + +CVE: CVE-2025-69649 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66] + +(cherry picked from commit 66a3492ce68e1ae45b2489bd9a815c39ea5d7f66) +Signed-off-by: Deepak Rathore +--- + binutils/readelf.c | 8 +++----- + 1 file changed, 3 insertions(+), 5 deletions(-) + +diff --git a/binutils/readelf.c b/binutils/readelf.c +index 8f188e8c3e2..1c16ab5f594 100644 +--- a/binutils/readelf.c ++++ b/binutils/readelf.c +@@ -9621,13 +9621,11 @@ process_relocs (Filedata * filedata) + size_t i; + bool found = false; + +- for (i = 0, section = filedata->section_headers; +- i < filedata->file_header.e_shnum; +- i++, section++) +- { ++ section = filedata->section_headers; ++ if (section != NULL) ++ for (i = 0; i < filedata->file_header.e_shnum; i++, section++) + if (display_relocations (section, filedata)) + found = true; +- } + + if (! found) + { +-- +2.44.1 From patchwork Fri Mar 13 06:25:32 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Deepak Rathore -X (deeratho - E INFOCHIPS PRIVATE LIMITED at Cisco)" X-Patchwork-Id: 83300 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 588C6106FD90 for ; Fri, 13 Mar 2026 06:26:21 +0000 (UTC) Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.10010.1773383166525131734 for ; Thu, 12 Mar 2026 23:26:06 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: message contains an insecure body length tag" header.i=@cisco.com header.s=iport01 header.b=EqA9Fl+F; spf=pass (domain: cisco.com, ip: 173.38.203.52, mailfrom: deeratho@cisco.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=2387; q=dns/txt; s=iport01; t=1773383166; x=1774592766; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=aWVjnXaEGkibU6bSadIDlRL5mGIHdIOranxb3/S1L0k=; b=EqA9Fl+FL09g5G4RpP5SdVSmSar3rn0Cn3YADG3LTgjwASLwr3LnK57e J6DAbOe1KaHu/d+K00gThpVpi3BjvltmAS64pfmIiLKNdQzTBndYWacYE 4bHZA2barwBHr6khVwR0JB8wnYuXv1wK9WeJlbqbcL/59ktqxHjbm61zH zQvx0nTCvqLIEWJSN/m3IQ3/B8RAaOTF77RZs4xOHIEKjP/NeQ+my6BTK 0Bx3Gq7eN8WMkxze0uv2RmTKvYfWj1wGxxV5ikwjd+LG1gQKGv4OIq3Fg kmTRQ/2y8nJzPzpbCgrSSCyOgXlxvCWtoi2HZPhA5Pqh1rnBdYCkOJtuF A==; X-CSE-ConnectionGUID: d8AGY6FvQTG1TCjbaCnW3Q== X-CSE-MsgGUID: nCRVE1TWSzOUnvAv1xlsJQ== X-IPAS-Result: A0CrBgAArbNp/89K/pBaHgEBCxIMggULgkgPcV9CSZQqgiSLZJI2gX8PAQEBD0QNBAEBhQcCjSICJjQJDgECBAEBAQEDAgMBAQEBAQEBAQEBAQsBAQUBAQECAQcFgQ4Thk8NhloBAgEDJwsBVhwDAQIvIAsjCBEIgwIBgjoDNgMRrziBeTOBAYNoAkNP2EcNglIBBQYUAYE4hTyCeYUgWxgBhHonGxuBcoEVgTuCLYEFgRpCAQMYghOFdwSCIoEOgWGRS0iBHgNZLAFVEw0KCwcFgWYDNRIqFW4yHYEjPheBCxsHBYUaD4hwdG2BE4MoAwsYDUgRLDcUGwQ+bgeNeD2CNIEOLKgdoCBxCiiDdIwejz6FfBozqmsLmHuOCYQJkkeEaIFoPIFHCwdwFYMiUhkPjjiFaIMUw2M7NQIJMQIHCwEBAwmTZwEB IronPort-Data: A9a23:DtPwxaLcO1wcWoxkFE+RhZQlxSXFcZb7ZxGr2PjKsXjdYENSgzUOz zNKXT/SaP7bYGD0eNEnbdvk90IP7MOGnYMxS1Ad+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcoZsCCSa/kvxWlTYhSEU/bmSQbbhA/LzNCl0RAt1IA8skhsLd9QR2uaEuvDnRVnW0 T/Oi5eHYgH9gGcuajh8B5+r8XuDgtyj4Fv0gXRmDRx7lAe2v2UYCpsZOZawIxPQKqFIHvS3T vr017qw+GXU5X8FUrtJRZ6iLyXm6paLVeS/oiI+t5qK23CulQRuukoPD8fwXG8M49m/c3+d/ /0W3XC4YV9B0qQhA43xWTEAe811FfUuFLMqvRFTvOTLp3AqfUcAzN1iXGgZDNM25N9LLjhy3 v4SIRsLUUu60rfeLLKTEoGAh+wqIdOuOMYUvWttiGmHS/0nWpvEBa7N4Le03h9p2pwIR6uCI ZVFL2A3M3wsYDUXUrsTIJ4zkf2hmnn4WzZZs1mS46Ew5gA/ySQsjOCwbYGOJ7RmQ+1TtXymi zv6wF/rJSwcKvWBkCqB6VCV07qncSTTHdh6+KeD3vlyjVuew2YeBBEbWR6wpuO0okq/QM5Eb UsM9ywjqKI/+ECmQp/6RRLQnZKflhcRQZ9UVuY98gzIkvSS6AeCDW9CRTlEADA7iPILqfUR/ gfht7vU6fZH6dV5lVr1Gm+okA6P IronPort-HdrOrdr: A9a23:QHmjNah7UMnBFCIIDqdKqocxdnBQXtsji2hC6mlwRA09TyX+rb HLoB1173HJYVoqNU3I3OrwW5VoIkmskKKdn7NxAV7KZmCP0wGVxcNZnOnfKlbbdBEWmNQw6U 4ZSchD4BmaNykdsS48izPIdOod/A== X-Talos-CUID: 9a23:UE88+266T9QIBA5a7Nss+B49NfF7XGPk8FiJH2S6A29CToLOcArF X-Talos-MUID: 9a23:X4iztA1w8l5picTFppSWnltmmzUj5Y+UNm1Urao9qe65MzJZJW6NiC+Ve9py X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="6.23,117,1770595200"; d="scan'208";a="54055335" Received: from aer-l-core-06.cisco.com ([144.254.74.207]) by aer-iport-2.cisco.com with ESMTP/TLS/TLS_AES_256_GCM_SHA384; 13 Mar 2026 06:26:02 +0000 Received: from bgl-ads-3413.cisco.com (bgl-ads-3413.cisco.com [173.39.60.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by aer-l-core-06.cisco.com (Postfix) with ESMTPS id 9C6E3180004B2 for ; Fri, 13 Mar 2026 06:26:02 +0000 (GMT) Received: by bgl-ads-3413.cisco.com (Postfix, from userid 1795984) id B8B4BCC1255; Fri, 13 Mar 2026 11:56:00 +0530 (IST) From: "Deepak Rathore -X (deeratho - E INFOCHIPS PRIVATE LIMITED at Cisco)" To: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 3/3] binutils: CVE-2025-69652 Date: Fri, 13 Mar 2026 11:55:32 +0530 Message-Id: <20260313062532.3247430-3-deeratho@cisco.com> X-Mailer: git-send-email 2.35.6 In-Reply-To: <20260313062532.3247430-1-deeratho@cisco.com> References: <20260313062532.3247430-1-deeratho@cisco.com> MIME-Version: 1.0 X-Outbound-SMTP-Client: 173.39.60.50, bgl-ads-3413.cisco.com X-Outbound-Node: aer-l-core-06.cisco.com List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 13 Mar 2026 06:26:21 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/233028 From: Deepak Rathore pick the patch [1] as mentioned in [2] [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=44b79abd0fa12e7947252eb4c6e5d16ed6033e01 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69652 Signed-off-by: Deepak Rathore diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index ff521e1b46..ca134051d5 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -48,4 +48,5 @@ SRC_URI = "\ file://0020-CVE-2025-11840.patch \ file://CVE-2025-69644.patch \ file://CVE-2025-69649.patch \ + file://CVE-2025-69652.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch new file mode 100644 index 0000000000..d345e33d04 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch @@ -0,0 +1,39 @@ +From 69d20318286c467efc764585e6c4967793bfd198 Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Mon, 8 Dec 2025 16:04:44 +1030 +Subject: [PATCH] PR 33701, abort in byte_get_little_endian + + PR 33701 + * dwarf.c (process_debug_info): Set debug_info_p NULL when + DEBUG_INFO_UNAVAILABLE. + +CVE: CVE-2025-69652 +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=44b79abd0fa12e7947252eb4c6e5d16ed6033e01] + +cherry picked from commit 44b79abd0fa12e7947252eb4c6e5d16ed6033e01) +Signed-off-by: Deepak Rathore +--- + binutils/dwarf.c | 8 +++++--- + 1 file changed, 5 insertions(+), 3 deletions(-) + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index 3c53821149c..d9f514180de 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -4248,9 +4248,11 @@ process_debug_info (struct dwarf_section * section, + break; + } + +- debug_info *debug_info_p = ((debug_information +- && unit < alloc_num_debug_info_entries) +- ? debug_information + unit : NULL); ++ debug_info *debug_info_p = NULL; ++ if (debug_information ++ && num_debug_info_entries != DEBUG_INFO_UNAVAILABLE ++ && unit < alloc_num_debug_info_entries) ++ debug_info_p = debug_information + unit; + + assert (!debug_info_p + || (debug_info_p->num_loc_offsets +-- +2.44.1