From b425859021d17adf62f06fb904797cf8642986ad Mon Sep 17 00:00:00 2001 From: Nick Clifton Date: Wed, 5 Feb 2025 16:27:38 +0000 Subject: [PATCH] Fix another illegal memory access triggered by corrupt ELF input files. PR 32644 Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=b425859021d17adf62f06fb904797cf8642986ad] CVE: CVE-2025-1182 Signed-off-by: Ashish Sharma bfd/elflink.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/bfd/elflink.c b/bfd/elflink.c index bf940942ec3..df6eb250961 100644 --- a/bfd/elflink.c +++ b/bfd/elflink.c @@ -15116,6 +15116,10 @@ bfd_elf_reloc_symbol_deleted_p (bfd_vma offset, void *cookie) } else { + if (r_symndx >= rcookie->locsymcount) + /* This can happen with corrupt input. */ + return false; + /* It's not a relocation against a global symbol, but it could be a relocation against a local symbol for a discarded section. */ -- 2.43.5