Blame SOURCES/binutils-CVE-2019-9074.patch

38fe89
--- binutils.orig/bfd/pei-x86_64.c	2019-02-25 16:12:29.798061414 +0000
38fe89
+++ binutils-2.31.1/bfd/pei-x86_64.c	2019-02-25 17:09:02.783425236 +0000
38fe89
@@ -541,7 +541,7 @@ pex64_bfd_print_pdata_section (bfd *abfd
38fe89
   /* virt_size might be zero for objects.  */
38fe89
   if (stop == 0 && strcmp (abfd->xvec->name, "pe-x86-64") == 0)
38fe89
     {
38fe89
-      stop = (datasize / onaline) * onaline;
38fe89
+      stop = datasize;
38fe89
       virt_size_is_zero = TRUE;
38fe89
     }
38fe89
   else if (datasize < stop)
38fe89
@@ -551,8 +551,8 @@ pex64_bfd_print_pdata_section (bfd *abfd
38fe89
 		 _("Warning: %s section size (%ld) is smaller than virtual size (%ld)\n"),
38fe89
 		 pdata_section->name, (unsigned long) datasize,
38fe89
 		 (unsigned long) stop);
38fe89
-	/* Be sure not to read passed datasize.  */
38fe89
-	stop = datasize / onaline;
38fe89
+	/* Be sure not to read past datasize.  */
38fe89
+	stop = datasize;
38fe89
       }
38fe89
 
38fe89
   /* Display functions table.  */
38fe89
@@ -724,8 +724,7 @@ pex64_bfd_print_pdata_section (bfd *abfd
38fe89
 	      altent += imagebase;
38fe89
 
38fe89
 	      if (altent >= pdata_vma
38fe89
-		  && (altent + PDATA_ROW_SIZE <= pdata_vma
38fe89
-		      + pei_section_data (abfd, pdata_section)->virt_size))
38fe89
+		  && altent - pdata_vma + PDATA_ROW_SIZE <= stop)
38fe89
 		{
38fe89
 		  pex64_get_runtime_function
38fe89
 		    (abfd, &arf, &pdata[altent - pdata_vma]);