summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch')
-rw-r--r--meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch44
1 files changed, 0 insertions, 44 deletions
diff --git a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
deleted file mode 100644
index 985f150f0f..0000000000
--- a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
+++ /dev/null
@@ -1,44 +0,0 @@
1From 71c812edf1431a9967bd99ba6ffa6ab89eb7ec7c Mon Sep 17 00:00:00 2001
2From: Leonardo Sandoval <leonardo.sandoval.gonzalez@linux.intel.com>
3Date: Wed, 10 Jun 2015 12:56:55 +0000
4Subject: [PATCH 1/2] rpm: CVE-2014-8118
5
6Upstream-Status: Backport
7CVE: CVE-2014-8118
8
9Reference:
10https://bugzilla.redhat.com/show_bug.cgi?id=1168715
11
12Description:
13It was found that RPM could encounter an integer overflow,
14leading to a stack-based overflow, while parsing a crafted
15CPIO header in the payload section of an RPM file. This could
16allow an attacker to modify signed RPM files in such a way that
17they would execute code chosen by the attacker during package
18installation.
19
20Original Patch:
21https://bugzilla.redhat.com/attachment.cgi?id=962159
22
23Signed-off-by: Leonardo Sandoval <leonardo.sandoval.gonzalez@linux.intel.com>
24---
25 lib/cpio.c | 3 +++
26 1 file changed, 3 insertions(+)
27
28diff --git a/lib/cpio.c b/lib/cpio.c
29index 382eeb6..74ddd9c 100644
30--- a/lib/cpio.c
31+++ b/lib/cpio.c
32@@ -296,6 +296,9 @@ int rpmcpioHeaderRead(rpmcpio_t cpio, char ** path, struct stat * st)
33 st->st_rdev = makedev(major, minor);
34
35 GET_NUM_FIELD(hdr.namesize, nameSize);
36+ if (nameSize <= 0 || nameSize > 4096) {
37+ return CPIOERR_BAD_HEADER;
38+ }
39
40 *path = xmalloc(nameSize + 1);
41 read = Fread(*path, nameSize, 1, cpio->fd);
42--
431.8.4.5
44