summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/busybox/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-core/busybox/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch')
-rw-r--r--meta/recipes-core/busybox/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch69
1 files changed, 69 insertions, 0 deletions
diff --git a/meta/recipes-core/busybox/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch b/meta/recipes-core/busybox/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
new file mode 100644
index 0000000000..1dbc3388a4
--- /dev/null
+++ b/meta/recipes-core/busybox/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
@@ -0,0 +1,69 @@
1From 812b407e545b70b16cf32aade135b5c32eaf674f Mon Sep 17 00:00:00 2001
2From: Ariadne Conill <ariadne@dereferenced.org>
3Date: Sun, 3 Apr 2022 12:16:45 +0000
4Subject: [PATCH 2/2] nslookup: sanitize all printed strings with
5 printable_string
6
7Otherwise, terminal sequences can be injected, which enables various terminal injection
8attacks from DNS results.
9
10CVE: CVE-2022-28391
11Upstream-Status: Submitted [https://bugs.busybox.net/show_bug.cgi?id=15001]
12Signed-off-by: Ariadne Conill <ariadne@dereferenced.org>
13Signed-off-by: Steve Sakoman <steve@sakoman.com>
14---
15 networking/nslookup.c | 10 +++++-----
16 1 file changed, 5 insertions(+), 5 deletions(-)
17
18diff --git a/networking/nslookup.c b/networking/nslookup.c
19index 6da97baf4..4bdcde1b8 100644
20--- a/networking/nslookup.c
21+++ b/networking/nslookup.c
22@@ -407,7 +407,7 @@ static NOINLINE int parse_reply(const unsigned char *msg, size_t len)
23 //printf("Unable to uncompress domain: %s\n", strerror(errno));
24 return -1;
25 }
26- printf(format, ns_rr_name(rr), dname);
27+ printf(format, ns_rr_name(rr), printable_string(dname));
28 break;
29
30 case ns_t_mx:
31@@ -422,7 +422,7 @@ static NOINLINE int parse_reply(const unsigned char *msg, size_t len)
32 //printf("Cannot uncompress MX domain: %s\n", strerror(errno));
33 return -1;
34 }
35- printf("%s\tmail exchanger = %d %s\n", ns_rr_name(rr), n, dname);
36+ printf("%s\tmail exchanger = %d %s\n", ns_rr_name(rr), n, printable_string(dname));
37 break;
38
39 case ns_t_txt:
40@@ -434,7 +434,7 @@ static NOINLINE int parse_reply(const unsigned char *msg, size_t len)
41 if (n > 0) {
42 memset(dname, 0, sizeof(dname));
43 memcpy(dname, ns_rr_rdata(rr) + 1, n);
44- printf("%s\ttext = \"%s\"\n", ns_rr_name(rr), dname);
45+ printf("%s\ttext = \"%s\"\n", ns_rr_name(rr), printable_string(dname));
46 }
47 break;
48
49@@ -454,7 +454,7 @@ static NOINLINE int parse_reply(const unsigned char *msg, size_t len)
50 }
51
52 printf("%s\tservice = %u %u %u %s\n", ns_rr_name(rr),
53- ns_get16(cp), ns_get16(cp + 2), ns_get16(cp + 4), dname);
54+ ns_get16(cp), ns_get16(cp + 2), ns_get16(cp + 4), printable_string(dname));
55 break;
56
57 case ns_t_soa:
58@@ -483,7 +483,7 @@ static NOINLINE int parse_reply(const unsigned char *msg, size_t len)
59 return -1;
60 }
61
62- printf("\tmail addr = %s\n", dname);
63+ printf("\tmail addr = %s\n", printable_string(dname));
64 cp += n;
65
66 printf("\tserial = %lu\n", ns_get32(cp));
67--
682.35.1
69