From 0a9ba3a53b0b68e9f10309593b274df4ec232992 Mon Sep 17 00:00:00 2001 From: Anuj Mittal Date: Thu, 12 Dec 2019 07:10:42 +0800 Subject: sysstat: fix CVE-2019-19725 (From OE-Core rev: 2bf6fdc460526feb0955b3b789e7be78f6e8ec4a) (From OE-Core rev: 66c428a676acd4dd2c7c7589ac651faef77c1323) Signed-off-by: Anuj Mittal Signed-off-by: Richard Purdie --- .../sysstat/sysstat/CVE-2019-19725.patch | 28 ++++++++++++++++++++++ meta/recipes-extended/sysstat/sysstat_12.1.6.bb | 1 + 2 files changed, 29 insertions(+) create mode 100644 meta/recipes-extended/sysstat/sysstat/CVE-2019-19725.patch (limited to 'meta/recipes-extended') diff --git a/meta/recipes-extended/sysstat/sysstat/CVE-2019-19725.patch b/meta/recipes-extended/sysstat/sysstat/CVE-2019-19725.patch new file mode 100644 index 0000000000..2aa12724f8 --- /dev/null +++ b/meta/recipes-extended/sysstat/sysstat/CVE-2019-19725.patch @@ -0,0 +1,28 @@ +From a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed Mon Sep 17 00:00:00 2001 +From: Sebastien GODARD +Date: Mon, 9 Dec 2019 17:54:07 +0100 +Subject: [PATCH] Fix #242: Double free in check_file_actlst() + +Avoid freeing buffer() twice. + +Signed-off-by: Sebastien GODARD + +Upstream-Status: Backport [https://github.com/sysstat/sysstat/commit/a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed] +CVE: CVE-2019-19725 +Signed-off-by: Anuj Mittal +--- + sa_common.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/sa_common.c b/sa_common.c +index cf52aefe..856a3715 100644 +--- a/sa_common.c ++++ b/sa_common.c +@@ -2153,6 +2153,7 @@ void check_file_actlst(int *ifd, char *dfile, struct activity *act[], uint64_t f + } + + free(buffer); ++ buffer = NULL; + + /* Check that at least one activity selected by the user is available in file */ + for (i = 0; i < NR_ACT; i++) { diff --git a/meta/recipes-extended/sysstat/sysstat_12.1.6.bb b/meta/recipes-extended/sysstat/sysstat_12.1.6.bb index 362888d506..674addb4df 100644 --- a/meta/recipes-extended/sysstat/sysstat_12.1.6.bb +++ b/meta/recipes-extended/sysstat/sysstat_12.1.6.bb @@ -4,6 +4,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=a23a74b3f4caf9616230789d94217acb" SRC_URI += "file://0001-Include-needed-headers-explicitly.patch \ file://0001-Fix-232-Memory-corruption-bug-due-to-Integer-Overflo.patch \ + file://CVE-2019-19725.patch \ " SRC_URI[md5sum] = "d8e3bbb9c873dd370f6d33664e326570" -- cgit v1.2.3-54-g00ecf