diff options
author | Jackie Huang <jackie.huang@windriver.com> | 2018-04-11 14:56:10 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-04-13 16:58:07 +0100 |
commit | 16174d9342f2c0ed376d8e797e8a7f04ed04f57c (patch) | |
tree | f4eef664d9675c7647d8e1cba79aa9923ad35786 | |
parent | 31714674e4dc9c1196553be7363c8a1d08565b4c (diff) | |
download | poky-16174d9342f2c0ed376d8e797e8a7f04ed04f57c.tar.gz |
patch: fix CVE-2018-1000156
* CVE detail: https://nvd.nist.gov/vuln/detail/CVE-2018-1000156
* upstream tracking: https://savannah.gnu.org/bugs/index.php?53566
* Fix arbitrary command execution in ed-style patches:
- src/pch.c (do_ed_script): Write ed script to a temporary file instead
of piping it to ed: this will cause ed to abort on invalid commands
instead of rejecting them and carrying on.
- tests/ed-style: New test case.
- tests/Makefile.am (TESTS): Add test case.
(From OE-Core rev: 6b6ae212837a07aaefd2b675b5b527fbce2a4270)
Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
3 files changed, 255 insertions, 0 deletions
diff --git a/meta/recipes-devtools/patch/patch/0003-Allow-input-files-to-be-missing-for-ed-style-patches.patch b/meta/recipes-devtools/patch/patch/0003-Allow-input-files-to-be-missing-for-ed-style-patches.patch new file mode 100644 index 0000000000..2a09d0c03b --- /dev/null +++ b/meta/recipes-devtools/patch/patch/0003-Allow-input-files-to-be-missing-for-ed-style-patches.patch | |||
@@ -0,0 +1,38 @@ | |||
1 | From b5a91a01e5d0897facdd0f49d64b76b0f02b43e1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Andreas Gruenbacher <agruen@gnu.org> | ||
3 | Date: Fri, 6 Apr 2018 11:34:51 +0200 | ||
4 | Subject: [PATCH] Allow input files to be missing for ed-style patches | ||
5 | |||
6 | * src/pch.c (do_ed_script): Allow input files to be missing so that new | ||
7 | files will be created as with non-ed-style patches. | ||
8 | |||
9 | Upstream-Status: Backport [http://git.savannah.gnu.org/cgit/patch.git/commit/?id=b5a91a01e5d0897facdd0f49d64b76b0f02b43e1] | ||
10 | CVE: CVE-2018-1000156 | ||
11 | |||
12 | Signed-off-by: Jackie Huang <jackie.huang@windriver.com> | ||
13 | --- | ||
14 | src/pch.c | 8 +++++--- | ||
15 | 1 file changed, 5 insertions(+), 3 deletions(-) | ||
16 | |||
17 | diff --git a/src/pch.c b/src/pch.c | ||
18 | index bc6278c..0c5cc26 100644 | ||
19 | --- a/src/pch.c | ||
20 | +++ b/src/pch.c | ||
21 | @@ -2394,9 +2394,11 @@ do_ed_script (char const *inname, char const *outname, | ||
22 | |||
23 | if (! dry_run && ! skip_rest_of_patch) { | ||
24 | int exclusive = *outname_needs_removal ? 0 : O_EXCL; | ||
25 | - assert (! inerrno); | ||
26 | - *outname_needs_removal = true; | ||
27 | - copy_file (inname, outname, 0, exclusive, instat.st_mode, true); | ||
28 | + if (inerrno != ENOENT) | ||
29 | + { | ||
30 | + *outname_needs_removal = true; | ||
31 | + copy_file (inname, outname, 0, exclusive, instat.st_mode, true); | ||
32 | + } | ||
33 | sprintf (buf, "%s %s%s", editor_program, | ||
34 | verbosity == VERBOSE ? "" : "- ", | ||
35 | outname); | ||
36 | -- | ||
37 | 2.7.4 | ||
38 | |||
diff --git a/meta/recipes-devtools/patch/patch/0004-Fix-arbitrary-command-execution-in-ed-style-patches-.patch b/meta/recipes-devtools/patch/patch/0004-Fix-arbitrary-command-execution-in-ed-style-patches-.patch new file mode 100644 index 0000000000..d74c2f182e --- /dev/null +++ b/meta/recipes-devtools/patch/patch/0004-Fix-arbitrary-command-execution-in-ed-style-patches-.patch | |||
@@ -0,0 +1,215 @@ | |||
1 | From 123eaff0d5d1aebe128295959435b9ca5909c26d Mon Sep 17 00:00:00 2001 | ||
2 | From: Andreas Gruenbacher <agruen@gnu.org> | ||
3 | Date: Fri, 6 Apr 2018 12:14:49 +0200 | ||
4 | Subject: [PATCH] Fix arbitrary command execution in ed-style patches (CVE-2018-1000156) | ||
5 | |||
6 | * src/pch.c (do_ed_script): Write ed script to a temporary file instead | ||
7 | of piping it to ed: this will cause ed to abort on invalid commands | ||
8 | instead of rejecting them and carrying on. | ||
9 | * tests/ed-style: New test case. | ||
10 | * tests/Makefile.am (TESTS): Add test case. | ||
11 | |||
12 | Upstream-Status: Backport [http://git.savannah.gnu.org/cgit/patch.git/commit/?id=123eaff0d5d1aebe128295959435b9ca5909c26d] | ||
13 | CVE: CVE-2018-1000156 | ||
14 | |||
15 | Signed-off-by: Jackie Huang <jackie.huang@windriver.com> | ||
16 | --- | ||
17 | src/pch.c | 91 ++++++++++++++++++++++++++++++++++++++++--------------- | ||
18 | tests/Makefile.am | 1 + | ||
19 | tests/ed-style | 41 +++++++++++++++++++++++++ | ||
20 | 3 files changed, 108 insertions(+), 25 deletions(-) | ||
21 | create mode 100644 tests/ed-style | ||
22 | |||
23 | diff --git a/src/pch.c b/src/pch.c | ||
24 | index 0c5cc26..4fd5a05 100644 | ||
25 | --- a/src/pch.c | ||
26 | +++ b/src/pch.c | ||
27 | @@ -33,6 +33,7 @@ | ||
28 | # include <io.h> | ||
29 | #endif | ||
30 | #include <safe.h> | ||
31 | +#include <sys/wait.h> | ||
32 | |||
33 | #define INITHUNKMAX 125 /* initial dynamic allocation size */ | ||
34 | |||
35 | @@ -2389,24 +2390,28 @@ do_ed_script (char const *inname, char const *outname, | ||
36 | static char const editor_program[] = EDITOR_PROGRAM; | ||
37 | |||
38 | file_offset beginning_of_this_line; | ||
39 | - FILE *pipefp = 0; | ||
40 | size_t chars_read; | ||
41 | + FILE *tmpfp = 0; | ||
42 | + char const *tmpname; | ||
43 | + int tmpfd; | ||
44 | + pid_t pid; | ||
45 | + | ||
46 | + if (! dry_run && ! skip_rest_of_patch) | ||
47 | + { | ||
48 | + /* Write ed script to a temporary file. This causes ed to abort on | ||
49 | + invalid commands such as when line numbers or ranges exceed the | ||
50 | + number of available lines. When ed reads from a pipe, it rejects | ||
51 | + invalid commands and treats the next line as a new command, which | ||
52 | + can lead to arbitrary command execution. */ | ||
53 | + | ||
54 | + tmpfd = make_tempfile (&tmpname, 'e', NULL, O_RDWR | O_BINARY, 0); | ||
55 | + if (tmpfd == -1) | ||
56 | + pfatal ("Can't create temporary file %s", quotearg (tmpname)); | ||
57 | + tmpfp = fdopen (tmpfd, "w+b"); | ||
58 | + if (! tmpfp) | ||
59 | + pfatal ("Can't open stream for file %s", quotearg (tmpname)); | ||
60 | + } | ||
61 | |||
62 | - if (! dry_run && ! skip_rest_of_patch) { | ||
63 | - int exclusive = *outname_needs_removal ? 0 : O_EXCL; | ||
64 | - if (inerrno != ENOENT) | ||
65 | - { | ||
66 | - *outname_needs_removal = true; | ||
67 | - copy_file (inname, outname, 0, exclusive, instat.st_mode, true); | ||
68 | - } | ||
69 | - sprintf (buf, "%s %s%s", editor_program, | ||
70 | - verbosity == VERBOSE ? "" : "- ", | ||
71 | - outname); | ||
72 | - fflush (stdout); | ||
73 | - pipefp = popen(buf, binary_transput ? "wb" : "w"); | ||
74 | - if (!pipefp) | ||
75 | - pfatal ("Can't open pipe to %s", quotearg (buf)); | ||
76 | - } | ||
77 | for (;;) { | ||
78 | char ed_command_letter; | ||
79 | beginning_of_this_line = file_tell (pfp); | ||
80 | @@ -2417,14 +2422,14 @@ do_ed_script (char const *inname, char const *outname, | ||
81 | } | ||
82 | ed_command_letter = get_ed_command_letter (buf); | ||
83 | if (ed_command_letter) { | ||
84 | - if (pipefp) | ||
85 | - if (! fwrite (buf, sizeof *buf, chars_read, pipefp)) | ||
86 | + if (tmpfp) | ||
87 | + if (! fwrite (buf, sizeof *buf, chars_read, tmpfp)) | ||
88 | write_fatal (); | ||
89 | if (ed_command_letter != 'd' && ed_command_letter != 's') { | ||
90 | p_pass_comments_through = true; | ||
91 | while ((chars_read = get_line ()) != 0) { | ||
92 | - if (pipefp) | ||
93 | - if (! fwrite (buf, sizeof *buf, chars_read, pipefp)) | ||
94 | + if (tmpfp) | ||
95 | + if (! fwrite (buf, sizeof *buf, chars_read, tmpfp)) | ||
96 | write_fatal (); | ||
97 | if (chars_read == 2 && strEQ (buf, ".\n")) | ||
98 | break; | ||
99 | @@ -2437,13 +2442,49 @@ do_ed_script (char const *inname, char const *outname, | ||
100 | break; | ||
101 | } | ||
102 | } | ||
103 | - if (!pipefp) | ||
104 | + if (!tmpfp) | ||
105 | return; | ||
106 | - if (fwrite ("w\nq\n", sizeof (char), (size_t) 4, pipefp) == 0 | ||
107 | - || fflush (pipefp) != 0) | ||
108 | + if (fwrite ("w\nq\n", sizeof (char), (size_t) 4, tmpfp) == 0 | ||
109 | + || fflush (tmpfp) != 0) | ||
110 | write_fatal (); | ||
111 | - if (pclose (pipefp) != 0) | ||
112 | - fatal ("%s FAILED", editor_program); | ||
113 | + | ||
114 | + if (lseek (tmpfd, 0, SEEK_SET) == -1) | ||
115 | + pfatal ("Can't rewind to the beginning of file %s", quotearg (tmpname)); | ||
116 | + | ||
117 | + if (! dry_run && ! skip_rest_of_patch) { | ||
118 | + int exclusive = *outname_needs_removal ? 0 : O_EXCL; | ||
119 | + *outname_needs_removal = true; | ||
120 | + if (inerrno != ENOENT) | ||
121 | + { | ||
122 | + *outname_needs_removal = true; | ||
123 | + copy_file (inname, outname, 0, exclusive, instat.st_mode, true); | ||
124 | + } | ||
125 | + sprintf (buf, "%s %s%s", editor_program, | ||
126 | + verbosity == VERBOSE ? "" : "- ", | ||
127 | + outname); | ||
128 | + fflush (stdout); | ||
129 | + | ||
130 | + pid = fork(); | ||
131 | + if (pid == -1) | ||
132 | + pfatal ("Can't fork"); | ||
133 | + else if (pid == 0) | ||
134 | + { | ||
135 | + dup2 (tmpfd, 0); | ||
136 | + execl ("/bin/sh", "sh", "-c", buf, (char *) 0); | ||
137 | + _exit (2); | ||
138 | + } | ||
139 | + else | ||
140 | + { | ||
141 | + int wstatus; | ||
142 | + if (waitpid (pid, &wstatus, 0) == -1 | ||
143 | + || ! WIFEXITED (wstatus) | ||
144 | + || WEXITSTATUS (wstatus) != 0) | ||
145 | + fatal ("%s FAILED", editor_program); | ||
146 | + } | ||
147 | + } | ||
148 | + | ||
149 | + fclose (tmpfp); | ||
150 | + safe_unlink (tmpname); | ||
151 | |||
152 | if (ofp) | ||
153 | { | ||
154 | diff --git a/tests/Makefile.am b/tests/Makefile.am | ||
155 | index 6b6df63..16f8693 100644 | ||
156 | --- a/tests/Makefile.am | ||
157 | +++ b/tests/Makefile.am | ||
158 | @@ -32,6 +32,7 @@ TESTS = \ | ||
159 | crlf-handling \ | ||
160 | dash-o-append \ | ||
161 | deep-directories \ | ||
162 | + ed-style \ | ||
163 | empty-files \ | ||
164 | false-match \ | ||
165 | fifo \ | ||
166 | diff --git a/tests/ed-style b/tests/ed-style | ||
167 | new file mode 100644 | ||
168 | index 0000000..d8c0689 | ||
169 | --- /dev/null | ||
170 | +++ b/tests/ed-style | ||
171 | @@ -0,0 +1,41 @@ | ||
172 | +# Copyright (C) 2018 Free Software Foundation, Inc. | ||
173 | +# | ||
174 | +# Copying and distribution of this file, with or without modification, | ||
175 | +# in any medium, are permitted without royalty provided the copyright | ||
176 | +# notice and this notice are preserved. | ||
177 | + | ||
178 | +. $srcdir/test-lib.sh | ||
179 | + | ||
180 | +require cat | ||
181 | +use_local_patch | ||
182 | +use_tmpdir | ||
183 | + | ||
184 | +# ============================================================== | ||
185 | + | ||
186 | +cat > ed1.diff <<EOF | ||
187 | +0a | ||
188 | +foo | ||
189 | +. | ||
190 | +EOF | ||
191 | + | ||
192 | +check 'patch -e foo -i ed1.diff' <<EOF | ||
193 | +EOF | ||
194 | + | ||
195 | +check 'cat foo' <<EOF | ||
196 | +foo | ||
197 | +EOF | ||
198 | + | ||
199 | +cat > ed2.diff <<EOF | ||
200 | +1337a | ||
201 | +r !echo bar | ||
202 | +,p | ||
203 | +EOF | ||
204 | + | ||
205 | +check 'patch -e foo -i ed2.diff 2> /dev/null || echo "Status: $?"' <<EOF | ||
206 | +? | ||
207 | +Status: 2 | ||
208 | +EOF | ||
209 | + | ||
210 | +check 'cat foo' <<EOF | ||
211 | +foo | ||
212 | +EOF | ||
213 | -- | ||
214 | 2.7.4 | ||
215 | |||
diff --git a/meta/recipes-devtools/patch/patch_2.7.6.bb b/meta/recipes-devtools/patch/patch_2.7.6.bb index 19ddf34981..823486dd0a 100644 --- a/meta/recipes-devtools/patch/patch_2.7.6.bb +++ b/meta/recipes-devtools/patch/patch_2.7.6.bb | |||
@@ -3,6 +3,8 @@ LICENSE = "GPLv3" | |||
3 | 3 | ||
4 | SRC_URI += "file://0001-Unset-need_charset_alias-when-building-for-musl.patch \ | 4 | SRC_URI += "file://0001-Unset-need_charset_alias-when-building-for-musl.patch \ |
5 | file://0002-Fix-segfault-with-mangled-rename-patch.patch \ | 5 | file://0002-Fix-segfault-with-mangled-rename-patch.patch \ |
6 | file://0003-Allow-input-files-to-be-missing-for-ed-style-patches.patch \ | ||
7 | file://0004-Fix-arbitrary-command-execution-in-ed-style-patches-.patch \ | ||
6 | " | 8 | " |
7 | 9 | ||
8 | SRC_URI[md5sum] = "4c68cee989d83c87b00a3860bcd05600" | 10 | SRC_URI[md5sum] = "4c68cee989d83c87b00a3860bcd05600" |