summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorJoshua Lock <josh@linux.intel.com>2012-02-29 16:34:27 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2012-03-01 15:59:58 +0000
commiteaec7e962433fa09ec5723afc9bada22ba4d6a45 (patch)
treef8b987ed0612715458c379bca478cd84b946faf2 /meta
parente6ea83feceb2c2eb77d707ed060a0ce29af79c4c (diff)
downloadpoky-eaec7e962433fa09ec5723afc9bada22ba4d6a45.tar.gz
sudo: backport patch to address CVE 2012-0809
This is a format string vulnerability "that can be used to crash sudo or potentially allow an unauthorized user to elevate privileges." (From OE-Core rev: 286cdd5db60b4f668e75cd9e05efb97acb08b7a6) Signed-off-by: Joshua Lock <josh@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-extended/sudo/files/format-string.patch33
-rw-r--r--meta/recipes-extended/sudo/sudo_1.8.1p2.bb5
2 files changed, 36 insertions, 2 deletions
diff --git a/meta/recipes-extended/sudo/files/format-string.patch b/meta/recipes-extended/sudo/files/format-string.patch
new file mode 100644
index 0000000000..15056fd4cc
--- /dev/null
+++ b/meta/recipes-extended/sudo/files/format-string.patch
@@ -0,0 +1,33 @@
1This patch, extracted from upstreams sudo-1.8.3p2.patch.gz addresses the
2recent Sudo format string vulnerability CVE 2012-0809.
3
4http://www.sudo.ws/sudo/alerts/sudo_debug.html
5
6Signed-off-by: Joshua Lock <josh@linux.intel.com>
7
8Upstream-Status: Backport
9
10diff -urNa sudo-1.8.3p1/src/sudo.c sudo-1.8.3p2/src/sudo.c
11--- sudo-1.8.3p1/src/sudo.c Fri Oct 21 09:01:26 2011
12+++ sudo-1.8.3p2/src/sudo.c Tue Jan 24 15:59:03 2012
13@@ -1208,15 +1208,15 @@
14 sudo_debug(int level, const char *fmt, ...)
15 {
16 va_list ap;
17- char *fmt2;
18+ char *buf;
19
20 if (level > debug_level)
21 return;
22
23- /* Backet fmt with program name and a newline to make it a single write */
24- easprintf(&fmt2, "%s: %s\n", getprogname(), fmt);
25+ /* Bracket fmt with program name and a newline to make it a single write */
26 va_start(ap, fmt);
27- vfprintf(stderr, fmt2, ap);
28+ evasprintf(&buf, fmt, ap);
29 va_end(ap);
30- efree(fmt2);
31+ fprintf(stderr, "%s: %s\n", getprogname(), buf);
32+ efree(buf);
33 }
diff --git a/meta/recipes-extended/sudo/sudo_1.8.1p2.bb b/meta/recipes-extended/sudo/sudo_1.8.1p2.bb
index b065447ed4..3694c89a42 100644
--- a/meta/recipes-extended/sudo/sudo_1.8.1p2.bb
+++ b/meta/recipes-extended/sudo/sudo_1.8.1p2.bb
@@ -1,10 +1,11 @@
1require sudo.inc 1require sudo.inc
2 2
3PR = "r3" 3PR = "r4"
4 4
5SRC_URI = "http://ftp.sudo.ws/sudo/dist/sudo-${PV}.tar.gz \ 5SRC_URI = "http://ftp.sudo.ws/sudo/dist/sudo-${PV}.tar.gz \
6 file://libtool.patch \ 6 file://libtool.patch \
7 file://sudo-parallel-build.patch \ 7 file://sudo-parallel-build.patch \
8 file://format-string.patch \
8 ${@base_contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)}" 9 ${@base_contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)}"
9 10
10PAM_SRC_URI = "file://sudo.pam" 11PAM_SRC_URI = "file://sudo.pam"