summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@arm.com>2022-11-07 18:02:04 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-11-14 15:59:15 +0000
commitc689d5d4e3c489e2c2d16438985a4dd18208ab83 (patch)
treefd19ff2c969ec9baaec7c5c86c9b036cf22eb9dd /meta
parent2ac597044a45c338beb3b4ec12612e4f69fcc9e2 (diff)
downloadpoky-c689d5d4e3c489e2c2d16438985a4dd18208ab83.tar.gz
pixman: backport fix for CVE-2022-44638
(From OE-Core rev: 23df4760ebc153c484d467e51b414910c570a6f8) Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch33
-rw-r--r--meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb1
2 files changed, 34 insertions, 0 deletions
diff --git a/meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch b/meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch
new file mode 100644
index 0000000000..d226766d49
--- /dev/null
+++ b/meta/recipes-graphics/xorg-lib/pixman/CVE-2022-44638.patch
@@ -0,0 +1,33 @@
1CVE: CVE-2022-44638
2Upstream-Status: Backport
3Signed-off-by: Ross Burton <ross.burton@arm.com>
4
5From a1f88e842e0216a5b4df1ab023caebe33c101395 Mon Sep 17 00:00:00 2001
6From: Matt Turner <mattst88@gmail.com>
7Date: Wed, 2 Nov 2022 12:07:32 -0400
8Subject: [PATCH] Avoid integer overflow leading to out-of-bounds write
9
10Thanks to Maddie Stone and Google's Project Zero for discovering this
11issue, providing a proof-of-concept, and a great analysis.
12
13Closes: https://gitlab.freedesktop.org/pixman/pixman/-/issues/63
14---
15 pixman/pixman-trap.c | 2 +-
16 1 file changed, 1 insertion(+), 1 deletion(-)
17
18diff --git a/pixman/pixman-trap.c b/pixman/pixman-trap.c
19index 91766fd..7560405 100644
20--- a/pixman/pixman-trap.c
21+++ b/pixman/pixman-trap.c
22@@ -74,7 +74,7 @@ pixman_sample_floor_y (pixman_fixed_t y,
23
24 if (f < Y_FRAC_FIRST (n))
25 {
26- if (pixman_fixed_to_int (i) == 0x8000)
27+ if (pixman_fixed_to_int (i) == 0xffff8000)
28 {
29 f = 0; /* saturate */
30 }
31--
32GitLab
33
diff --git a/meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb b/meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb
index ccfe277746..c56733eefd 100644
--- a/meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb
+++ b/meta/recipes-graphics/xorg-lib/pixman_0.40.0.bb
@@ -9,6 +9,7 @@ DEPENDS = "zlib"
9 9
10SRC_URI = "https://www.cairographics.org/releases/${BP}.tar.gz \ 10SRC_URI = "https://www.cairographics.org/releases/${BP}.tar.gz \
11 file://0001-ARM-qemu-related-workarounds-in-cpu-features-detecti.patch \ 11 file://0001-ARM-qemu-related-workarounds-in-cpu-features-detecti.patch \
12 file://CVE-2022-44638.patch \
12 " 13 "
13SRC_URI[md5sum] = "73858c0862dd9896fb5f62ae267084a4" 14SRC_URI[md5sum] = "73858c0862dd9896fb5f62ae267084a4"
14SRC_URI[sha256sum] = "6d200dec3740d9ec4ec8d1180e25779c00bc749f94278c8b9021f5534db223fc" 15SRC_URI[sha256sum] = "6d200dec3740d9ec4ec8d1180e25779c00bc749f94278c8b9021f5534db223fc"