diff options
| author | Peter Marko <peter.marko@siemens.com> | 2024-12-27 11:56:04 +0100 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2025-02-04 14:29:37 -0800 |
| commit | cf633ae4691c5572d82e384069d75b10b9e4d604 (patch) | |
| tree | 495ca2309ab039b37e266384fffabdd85db8ced4 | |
| parent | 14cd4fb44e004416cb7bcc0d76dc5cdc2e58b8e0 (diff) | |
| download | meta-openembedded-cf633ae4691c5572d82e384069d75b10b9e4d604.tar.gz | |
procmail: patch CVE-2014-3618
Take patch from Debian.
https://sources.debian.org/data/main/p/procmail/3.22-20%2Bdeb7u1/debian/patches/CVE-2014-3618.patch
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 8378820dab0b6955fb0e2b27f24a1626f9124e5b)
[Fixup for styhead context]
Signed-off-by: Armin Kuster <akuster808@gmail.com>
| -rw-r--r-- | meta-oe/recipes-support/procmail/procmail/CVE-2014-3618.patch | 29 | ||||
| -rw-r--r-- | meta-oe/recipes-support/procmail/procmail_3.22.bb | 4 |
2 files changed, 32 insertions, 1 deletions
diff --git a/meta-oe/recipes-support/procmail/procmail/CVE-2014-3618.patch b/meta-oe/recipes-support/procmail/procmail/CVE-2014-3618.patch new file mode 100644 index 0000000000..b041924361 --- /dev/null +++ b/meta-oe/recipes-support/procmail/procmail/CVE-2014-3618.patch | |||
| @@ -0,0 +1,29 @@ | |||
| 1 | Description: Fix heap-overflow in formail | ||
| 2 | CVE-2014-3618: Heap-overflow in formail when processing | ||
| 3 | specially-crafted email headers. | ||
| 4 | Origin: http://www.openwall.com/lists/oss-security/2014/09/03/8 | ||
| 5 | Bug-Debian: https://bugs.debian.org/704675 | ||
| 6 | Bug-Debian: https://bugs.debian.org/760443 | ||
| 7 | Forwarded: not-needed | ||
| 8 | Last-Update: 2014-09-04 | ||
| 9 | |||
| 10 | CVE: CVE-2014-3618 | ||
| 11 | Upstream-Status: Inactive-Upstream [lastrelease: 2001] | ||
| 12 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
| 13 | |||
| 14 | --- a/src/formisc.c | ||
| 15 | +++ b/src/formisc.c | ||
| 16 | @@ -84,12 +84,11 @@ normal: *target++= *start++; | ||
| 17 | case '"':*target++=delim='"';start++; | ||
| 18 | } | ||
| 19 | ;{ int i; | ||
| 20 | - do | ||
| 21 | + while(*start) | ||
| 22 | if((i= *target++= *start++)==delim) /* corresponding delimiter? */ | ||
| 23 | break; | ||
| 24 | else if(i=='\\'&&*start) /* skip quoted character */ | ||
| 25 | *target++= *start++; | ||
| 26 | - while(*start); /* anything? */ | ||
| 27 | } | ||
| 28 | hitspc=2; | ||
| 29 | } | ||
diff --git a/meta-oe/recipes-support/procmail/procmail_3.22.bb b/meta-oe/recipes-support/procmail/procmail_3.22.bb index abb87f9935..4806bf5f80 100644 --- a/meta-oe/recipes-support/procmail/procmail_3.22.bb +++ b/meta-oe/recipes-support/procmail/procmail_3.22.bb | |||
| @@ -12,7 +12,9 @@ SRC_URI = "http://www.ring.gr.jp/archives/net/mail/${BPN}/${BP}.tar.gz \ | |||
| 12 | file://from-debian-to-fix-compile-errors.patch \ | 12 | file://from-debian-to-fix-compile-errors.patch \ |
| 13 | file://from-debian-to-modify-parameters.patch \ | 13 | file://from-debian-to-modify-parameters.patch \ |
| 14 | file://from-debian-to-fix-man-file.patch \ | 14 | file://from-debian-to-fix-man-file.patch \ |
| 15 | file://man-file-mailstat.1-from-debian.patch" | 15 | file://man-file-mailstat.1-from-debian.patch \ |
| 16 | file://CVE-2014-3618.patch \ | ||
| 17 | " | ||
| 16 | SRC_URI[md5sum] = "1678ea99b973eb77eda4ecf6acae53f1" | 18 | SRC_URI[md5sum] = "1678ea99b973eb77eda4ecf6acae53f1" |
| 17 | SRC_URI[sha256sum] = "087c75b34dd33d8b9df5afe9e42801c9395f4bf373a784d9bc97153b0062e117" | 19 | SRC_URI[sha256sum] = "087c75b34dd33d8b9df5afe9e42801c9395f4bf373a784d9bc97153b0062e117" |
| 18 | 20 | ||
