diff options
author | Ross Burton <ross.burton@arm.com> | 2022-11-07 18:02:04 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-11-14 15:59:15 +0000 |
commit | c689d5d4e3c489e2c2d16438985a4dd18208ab83 (patch) | |
tree | fd19ff2c969ec9baaec7c5c86c9b036cf22eb9dd /meta | |
parent | 2ac597044a45c338beb3b4ec12612e4f69fcc9e2 (diff) | |
download | poky-c689d5d4e3c489e2c2d16438985a4dd18208ab83.tar.gz |
pixman: backport fix for CVE-2022-44638
(From OE-Core rev: 23df4760ebc153c484d467e51b414910c570a6f8)
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch | 33 | ||||
-rw-r--r-- | meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb | 1 |
2 files changed, 34 insertions, 0 deletions
diff --git a/meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch b/meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch new file mode 100644 index 0000000000..d226766d49 --- /dev/null +++ b/meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch | |||
@@ -0,0 +1,33 @@ | |||
1 | CVE: CVE-2022-44638 | ||
2 | Upstream-Status: Backport | ||
3 | Signed-off-by: Ross Burton <ross.burton@arm.com> | ||
4 | |||
5 | From a1f88e842e0216a5b4df1ab023caebe33c101395 Mon Sep 17 00:00:00 2001 | ||
6 | From: Matt Turner <mattst88@gmail.com> | ||
7 | Date: Wed, 2 Nov 2022 12:07:32 -0400 | ||
8 | Subject: [PATCH] Avoid integer overflow leading to out-of-bounds write | ||
9 | |||
10 | Thanks to Maddie Stone and Google's Project Zero for discovering this | ||
11 | issue, providing a proof-of-concept, and a great analysis. | ||
12 | |||
13 | Closes: https://gitlab.freedesktop.org/pixman/pixman/-/issues/63 | ||
14 | --- | ||
15 | pixman/pixman-trap.c | 2 +- | ||
16 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
17 | |||
18 | diff --git a/pixman/pixman-trap.c b/pixman/pixman-trap.c | ||
19 | index 91766fd..7560405 100644 | ||
20 | --- a/pixman/pixman-trap.c | ||
21 | +++ b/pixman/pixman-trap.c | ||
22 | @@ -74,7 +74,7 @@ pixman_sample_floor_y (pixman_fixed_t y, | ||
23 | |||
24 | if (f < Y_FRAC_FIRST (n)) | ||
25 | { | ||
26 | - if (pixman_fixed_to_int (i) == 0x8000) | ||
27 | + if (pixman_fixed_to_int (i) == 0xffff8000) | ||
28 | { | ||
29 | f = 0; /* saturate */ | ||
30 | } | ||
31 | -- | ||
32 | GitLab | ||
33 | |||
diff --git a/meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb b/meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb index ccfe277746..c56733eefd 100644 --- a/meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb +++ b/meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb | |||
@@ -9,6 +9,7 @@ DEPENDS = "zlib" | |||
9 | 9 | ||
10 | SRC_URI = "https://www.cairographics.org/releases/${BP}.tar.gz \ | 10 | SRC_URI = "https://www.cairographics.org/releases/${BP}.tar.gz \ |
11 | file://0001-ARM-qemu-related-workarounds-in-cpu-features-detecti.patch \ | 11 | file://0001-ARM-qemu-related-workarounds-in-cpu-features-detecti.patch \ |
12 | file://CVE-2022-44638.patch \ | ||
12 | " | 13 | " |
13 | SRC_URI[md5sum] = "73858c0862dd9896fb5f62ae267084a4" | 14 | SRC_URI[md5sum] = "73858c0862dd9896fb5f62ae267084a4" |
14 | SRC_URI[sha256sum] = "6d200dec3740d9ec4ec8d1180e25779c00bc749f94278c8b9021f5534db223fc" | 15 | SRC_URI[sha256sum] = "6d200dec3740d9ec4ec8d1180e25779c00bc749f94278c8b9021f5534db223fc" |