diff options
author | Scott Murray <scott.murray@konsulko.com> | 2021-02-21 21:52:06 -0500 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-02-23 22:35:01 +0000 |
commit | 2c6604b9a114ee5b38d686ed5921215c934d5fe0 (patch) | |
tree | cf521a1764a02d0d6d13b1a84edc8fcb61a829bf | |
parent | 4d570546fd3de3952701738aad3ee7cac9beb9ba (diff) | |
download | poky-2c6604b9a114ee5b38d686ed5921215c934d5fe0.tar.gz |
screen: fix CVE-2021-26937
Apply patch from Debian to fix CVE-2021-26937.
(From OE-Core rev: 6d688cc8672b1830ba10966492ab3f8a12d32e17)
Signed-off-by: Scott Murray <scott.murray@konsulko.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r-- | meta/recipes-extended/screen/screen/CVE-2021-26937.patch | 68 | ||||
-rw-r--r-- | meta/recipes-extended/screen/screen_4.8.0.bb | 1 |
2 files changed, 69 insertions, 0 deletions
diff --git a/meta/recipes-extended/screen/screen/CVE-2021-26937.patch b/meta/recipes-extended/screen/screen/CVE-2021-26937.patch new file mode 100644 index 0000000000..983b35c1b0 --- /dev/null +++ b/meta/recipes-extended/screen/screen/CVE-2021-26937.patch | |||
@@ -0,0 +1,68 @@ | |||
1 | Description: [CVE-2021-26937] Fix out of bounds array access | ||
2 | Author: Michael Schröder <mls@suse.de> | ||
3 | Bug-Debian: https://bugs.debian.org/982435 | ||
4 | Bug: https://savannah.gnu.org/bugs/?60030 | ||
5 | Bug: https://lists.gnu.org/archive/html/screen-devel/2021-02/msg00000.html | ||
6 | Bug-OSS-Security: https://www.openwall.com/lists/oss-security/2021/02/09/3 | ||
7 | Origin: https://lists.gnu.org/archive/html/screen-devel/2021-02/msg00010.html | ||
8 | |||
9 | CVE: CVE-2021-26937 | ||
10 | Upstream-Status: Pending | ||
11 | Signed-off-by: Scott Murray <scott.murray@konsulko.com> | ||
12 | |||
13 | --- a/encoding.c | ||
14 | +++ b/encoding.c | ||
15 | @@ -43,7 +43,7 @@ | ||
16 | # ifdef UTF8 | ||
17 | static int recode_char __P((int, int, int)); | ||
18 | static int recode_char_to_encoding __P((int, int)); | ||
19 | -static void comb_tofront __P((int, int)); | ||
20 | +static void comb_tofront __P((int)); | ||
21 | # ifdef DW_CHARS | ||
22 | static int recode_char_dw __P((int, int *, int, int)); | ||
23 | static int recode_char_dw_to_encoding __P((int, int *, int)); | ||
24 | @@ -1263,6 +1263,8 @@ | ||
25 | {0x30000, 0x3FFFD}, | ||
26 | }; | ||
27 | |||
28 | + if (c >= 0xdf00 && c <= 0xdfff) | ||
29 | + return 1; /* dw combining sequence */ | ||
30 | return ((bisearch(c, wide, sizeof(wide) / sizeof(struct interval) - 1)) || | ||
31 | (cjkwidth && | ||
32 | bisearch(c, ambiguous, | ||
33 | @@ -1330,11 +1332,12 @@ | ||
34 | } | ||
35 | |||
36 | static void | ||
37 | -comb_tofront(root, i) | ||
38 | -int root, i; | ||
39 | +comb_tofront(i) | ||
40 | +int i; | ||
41 | { | ||
42 | for (;;) | ||
43 | { | ||
44 | + int root = i >= 0x700 ? 0x801 : 0x800; | ||
45 | debug1("bring to front: %x\n", i); | ||
46 | combchars[combchars[i]->prev]->next = combchars[i]->next; | ||
47 | combchars[combchars[i]->next]->prev = combchars[i]->prev; | ||
48 | @@ -1396,9 +1399,9 @@ | ||
49 | { | ||
50 | /* full, recycle old entry */ | ||
51 | if (c1 >= 0xd800 && c1 < 0xe000) | ||
52 | - comb_tofront(root, c1 - 0xd800); | ||
53 | + comb_tofront(c1 - 0xd800); | ||
54 | i = combchars[root]->prev; | ||
55 | - if (c1 == i + 0xd800) | ||
56 | + if (i == 0x800 || i == 0x801 || c1 == i + 0xd800) | ||
57 | { | ||
58 | /* completely full, can't recycle */ | ||
59 | debug("utf8_handle_comp: completely full!\n"); | ||
60 | @@ -1422,7 +1425,7 @@ | ||
61 | mc->font = (i >> 8) + 0xd8; | ||
62 | mc->fontx = 0; | ||
63 | debug3("combinig char %x %x -> %x\n", c1, c, i + 0xd800); | ||
64 | - comb_tofront(root, i); | ||
65 | + comb_tofront(i); | ||
66 | } | ||
67 | |||
68 | #else /* !UTF8 */ | ||
diff --git a/meta/recipes-extended/screen/screen_4.8.0.bb b/meta/recipes-extended/screen/screen_4.8.0.bb index 4772eb6c7a..fe640c262b 100644 --- a/meta/recipes-extended/screen/screen_4.8.0.bb +++ b/meta/recipes-extended/screen/screen_4.8.0.bb | |||
@@ -21,6 +21,7 @@ SRC_URI = "${GNU_MIRROR}/screen/screen-${PV}.tar.gz \ | |||
21 | file://0002-comm.h-now-depends-on-term.h.patch \ | 21 | file://0002-comm.h-now-depends-on-term.h.patch \ |
22 | file://0001-fix-for-multijob-build.patch \ | 22 | file://0001-fix-for-multijob-build.patch \ |
23 | file://0001-Remove-more-compatibility-stuff.patch \ | 23 | file://0001-Remove-more-compatibility-stuff.patch \ |
24 | file://CVE-2021-26937.patch \ | ||
24 | " | 25 | " |
25 | 26 | ||
26 | SRC_URI[md5sum] = "d276213d3acd10339cd37848b8c4ab1e" | 27 | SRC_URI[md5sum] = "d276213d3acd10339cd37848b8c4ab1e" |