]> git.ipfire.org Git - thirdparty/binutils-gdb.git/commitdiff
Fix illegal memory access implementing relocs in a fuzzed x86_64 object file.
authorNick Clifton <nickc@redhat.com>
Mon, 19 Jun 2023 11:09:11 +0000 (12:09 +0100)
committerNick Clifton <nickc@redhat.com>
Mon, 19 Jun 2023 11:09:11 +0000 (12:09 +0100)
  PR 30560
  * elf64-x86-64.c (elf_x86_64_relocate_section): Add more checks for a valid relocation offset.

bfd/ChangeLog
bfd/elf64-x86-64.c

index 1f9b7ec14ba0a39e268d184f2a11d0efd78c0496..4fed6e16874b81be72e620898f8f310da2ece8c4 100644 (file)
@@ -1,3 +1,9 @@
+2023-06-19  Nick Clifton  <nickc@redhat.com>
+
+       PR 30560
+       * elf64-x86-64.c (elf_x86_64_relocate_section): Add more checks
+       for a valid relocation offset.
+
 2023-06-07  Nick Clifton  <nickc@redhat.com>
 
        PR 30499
index dd987ee011bb8afac8b05775059de03a35fe1834..f926464d8128472df616b52b5143ff8c5d78e7d5 100644 (file)
@@ -3501,6 +3501,9 @@ elf_x86_64_relocate_section (bfd *output_bfd,
            {
              bfd_vma roff = rel->r_offset;
 
+             if (roff >= input_section->size)
+               goto corrupt_input;
+
              BFD_ASSERT (! unresolved_reloc);
 
              if (r_type == R_X86_64_TLSGD)
@@ -3541,6 +3544,8 @@ elf_x86_64_relocate_section (bfd *output_bfd,
                  int largepic = 0;
                  if (ABI_64_P (output_bfd))
                    {
+                     if (roff + 5 >= input_section->size)
+                       goto corrupt_input;
                      if (contents[roff + 5] == 0xb8)
                        {
                          if (roff < 3
@@ -3576,6 +3581,10 @@ elf_x86_64_relocate_section (bfd *output_bfd,
                              "\x64\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
                              15);
                    }
+
+                 if (roff + 8 + largepic >= input_section->size)
+                   goto corrupt_input;
+
                  bfd_put_32 (output_bfd,
                              elf_x86_64_tpoff (info, relocation),
                              contents + roff + 8 + largepic);
@@ -3633,12 +3642,18 @@ elf_x86_64_relocate_section (bfd *output_bfd,
                    }
                  if (prefix)
                    {
+                     if (roff + 2 >= input_section->size)
+                       goto corrupt_input;
+
                      bfd_put_8 (output_bfd, 0x0f, contents + roff);
                      bfd_put_8 (output_bfd, 0x1f, contents + roff + 1);
                      bfd_put_8 (output_bfd, 0x00, contents + roff + 2);
                    }
                  else
                    {
+                     if (roff + 1 >= input_section->size)
+                       goto corrupt_input;
+
                      bfd_put_8 (output_bfd, 0x66, contents + roff);
                      bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
                    }