diff options
author | rajmohan r <rajmohan.r@kpit.com> | 2023-04-19 16:04:55 +0530 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2023-04-26 04:19:06 -1000 |
commit | afb4425be96e8e5a47a5dd3b87d5615bd3d8e0eb (patch) | |
tree | 3a8ede591cc89997ae6a28995323fc5ff938c53f /meta/recipes-core/systemd/systemd_244.5.bb | |
parent | 20c932eb013ebf83ef435a29edd8d10f577aaf4b (diff) | |
download | poky-afb4425be96e8e5a47a5dd3b87d5615bd3d8e0eb.tar.gz |
systemd: Fix CVE-2023-26604
Below patch files to fix CVE-2023-26604
CVE-2023-26604-1.patch, CVE-2023-26604-2.patch and
CVE-2023-26604-3.patch and CVE-2023-26604-4.patch
make pager secure when under euid is changed or explicitly
requested
Reference:
CVE-2023-26604-1.patch:
https://github.com/systemd/systemd/pull/17270/commits/612ebf6c913dd0e4197c44909cb3157f5c51a2f0
CVE-2023-26604-2.patch:
https://github.com/systemd/systemd/pull/17270/commits/1b5b507cd2d1d7a2b053151abb548475ad9c5c3b
CVE-2023-26604-3.patch:
https://github.com/systemd/systemd/pull/17270/commits/0a42426d797406b4b01a0d9c13bb759c2629d108
CVE-2023-26604-4.patch:
https://github.com/systemd/systemd/pull/17359/commits/b8f736b30e20a2b44e7c34bb4e43b0d97ae77e3c
(From OE-Core rev: 7880eb801dcee44a9e8920d249057492d1de6b12)
Signed-off-by: rajmohan r <rajmohan.r@kpit.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-core/systemd/systemd_244.5.bb')
-rw-r--r-- | meta/recipes-core/systemd/systemd_244.5.bb | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/meta/recipes-core/systemd/systemd_244.5.bb b/meta/recipes-core/systemd/systemd_244.5.bb index 8dd59f7636..bd66d82932 100644 --- a/meta/recipes-core/systemd/systemd_244.5.bb +++ b/meta/recipes-core/systemd/systemd_244.5.bb | |||
@@ -35,6 +35,10 @@ SRC_URI += "file://touchscreen.rules \ | |||
35 | file://CVE-2021-3997-2.patch \ | 35 | file://CVE-2021-3997-2.patch \ |
36 | file://CVE-2021-3997-3.patch \ | 36 | file://CVE-2021-3997-3.patch \ |
37 | file://CVE-2022-3821.patch \ | 37 | file://CVE-2022-3821.patch \ |
38 | file://CVE-2023-26604-1.patch \ | ||
39 | file://CVE-2023-26604-2.patch \ | ||
40 | file://CVE-2023-26604-3.patch \ | ||
41 | file://CVE-2023-26604-4.patch \ | ||
38 | " | 42 | " |
39 | 43 | ||
40 | # patches needed by musl | 44 | # patches needed by musl |