summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
diff options
context:
space:
mode:
authorRobert Yang <liezhi.yang@windriver.com>2016-04-05 23:58:40 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-04-06 22:57:25 +0100
commit476eeeae0fdde0cd4952b8c4501813b316c8a330 (patch)
tree222c5676cf5b53fcced6a0ec9e819241113a4d7c /meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
parent3d56864fd3ea190a2fa203bba37aa4125919e676 (diff)
downloadpoky-476eeeae0fdde0cd4952b8c4501813b316c8a330.tar.gz
rpm: remove two unused patch
They are already in the source: rpm-CVE-2013-6435.patch rpm-CVE-2014-8118.patch (From OE-Core rev: 8bed58160316c84bb4c4e866058f695c4402b95e) Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch')
-rw-r--r--meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch44
1 files changed, 0 insertions, 44 deletions
diff --git a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
deleted file mode 100644
index 985f150f0f..0000000000
--- a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
+++ /dev/null
@@ -1,44 +0,0 @@
1From 71c812edf1431a9967bd99ba6ffa6ab89eb7ec7c Mon Sep 17 00:00:00 2001
2From: Leonardo Sandoval <leonardo.sandoval.gonzalez@linux.intel.com>
3Date: Wed, 10 Jun 2015 12:56:55 +0000
4Subject: [PATCH 1/2] rpm: CVE-2014-8118
5
6Upstream-Status: Backport
7CVE: CVE-2014-8118
8
9Reference:
10https://bugzilla.redhat.com/show_bug.cgi?id=1168715
11
12Description:
13It was found that RPM could encounter an integer overflow,
14leading to a stack-based overflow, while parsing a crafted
15CPIO header in the payload section of an RPM file. This could
16allow an attacker to modify signed RPM files in such a way that
17they would execute code chosen by the attacker during package
18installation.
19
20Original Patch:
21https://bugzilla.redhat.com/attachment.cgi?id=962159
22
23Signed-off-by: Leonardo Sandoval <leonardo.sandoval.gonzalez@linux.intel.com>
24---
25 lib/cpio.c | 3 +++
26 1 file changed, 3 insertions(+)
27
28diff --git a/lib/cpio.c b/lib/cpio.c
29index 382eeb6..74ddd9c 100644
30--- a/lib/cpio.c
31+++ b/lib/cpio.c
32@@ -296,6 +296,9 @@ int rpmcpioHeaderRead(rpmcpio_t cpio, char ** path, struct stat * st)
33 st->st_rdev = makedev(major, minor);
34
35 GET_NUM_FIELD(hdr.namesize, nameSize);
36+ if (nameSize <= 0 || nameSize > 4096) {
37+ return CPIOERR_BAD_HEADER;
38+ }
39
40 *path = xmalloc(nameSize + 1);
41 read = Fread(*path, nameSize, 1, cpio->fd);
42--
431.8.4.5
44