diff options
| author | Polampalli, Archana <archana.polampalli@windriver.com> | 2023-06-16 12:20:24 +0000 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2023-06-17 14:22:25 -0400 |
| commit | 0393024cc5ccbe2575ca1f0db0af56c5682a7ce4 (patch) | |
| tree | 69372e9109a02e5411a712646b7a0ff4c069e8a3 | |
| parent | 84544d644086e5e003fbd4056ae5e9135a94ac00 (diff) | |
| download | meta-openembedded-0393024cc5ccbe2575ca1f0db0af56c5682a7ce4.tar.gz | |
samba: fix CVE-2022-41916
Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos.
Versions prior to 7.7.1 are vulnerable to a denial of service
vulnerability in Heimdal's PKI certificate validation library,
affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as
any third-party applications using Heimdal's libhx509. Users
should upgrade to Heimdal 7.7.1 or 7.8. There are no known
workarounds for this issue.
References:
https://nvd.nist.gov/vuln/detail/CVE-2022-41916
Upstream patches:
https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
| -rw-r--r-- | meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch | 38 | ||||
| -rw-r--r-- | meta-networking/recipes-connectivity/samba/samba_4.14.14.bb | 1 |
2 files changed, 39 insertions, 0 deletions
diff --git a/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch new file mode 100644 index 0000000000..07f4a18a2f --- /dev/null +++ b/meta-networking/recipes-connectivity/samba/samba/CVE-2022-41916.patch | |||
| @@ -0,0 +1,38 @@ | |||
| 1 | From eb87af0c2d189c25294c7daf483a47b03af80c2c Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Jeffrey Altman <jaltman@secure-endpoints.com> | ||
| 3 | Date: Wed, 17 Nov 2021 20:00:29 -0500 | ||
| 4 | Subject: [PATCH] lib/wind: find_normalize read past end of array | ||
| 5 | |||
| 6 | find_normalize() can under some circumstances read one element | ||
| 7 | beyond the input array. The contents are discarded immediately | ||
| 8 | without further use. | ||
| 9 | |||
| 10 | This change prevents the unintended read. | ||
| 11 | |||
| 12 | (cherry picked from commit 357a38fc7fb582ae73f4b7f4a90a4b0b871b149e) | ||
| 13 | |||
| 14 | Change-Id: Ia2759a5632d64f7fa6553f879b5bbbf43ba3513e | ||
| 15 | |||
| 16 | Upstream-Status: Backport [https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c] | ||
| 17 | CVE: CVE-2022-41916 | ||
| 18 | |||
| 19 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
| 20 | --- | ||
| 21 | lib/wind/normalize.c | 2 +- | ||
| 22 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
| 23 | |||
| 24 | diff --git a/lib/wind/normalize.c b/lib/wind/normalize.c | ||
| 25 | index 20e8a4a04b..8f3991d10e 100644 | ||
| 26 | --- a/lib/wind/normalize.c | ||
| 27 | +++ b/lib/wind/normalize.c | ||
| 28 | @@ -227,9 +227,9 @@ find_composition(const uint32_t *in, unsigned in_len) | ||
| 29 | unsigned i; | ||
| 30 | |||
| 31 | if (n % 5 == 0) { | ||
| 32 | - cur = *in++; | ||
| 33 | if (in_len-- == 0) | ||
| 34 | return c->val; | ||
| 35 | + cur = *in++; | ||
| 36 | } | ||
| 37 | |||
| 38 | i = cur >> 16; | ||
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb index cc07d51dc5..fcec63752f 100644 --- a/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb +++ b/meta-networking/recipes-connectivity/samba/samba_4.14.14.bb | |||
| @@ -31,6 +31,7 @@ SRC_URI = "${SAMBA_MIRROR}/stable/samba-${PV}.tar.gz \ | |||
| 31 | file://CVE-2022-3437-0007.patch;patchdir=source4/heimdal \ | 31 | file://CVE-2022-3437-0007.patch;patchdir=source4/heimdal \ |
| 32 | file://CVE-2022-3437-0008.patch;patchdir=source4/heimdal \ | 32 | file://CVE-2022-3437-0008.patch;patchdir=source4/heimdal \ |
| 33 | file://CVE-2022-45142.patch;patchdir=source4/heimdal \ | 33 | file://CVE-2022-45142.patch;patchdir=source4/heimdal \ |
| 34 | file://CVE-2022-41916.patch;patchdir=source4/heimdal \ | ||
| 34 | " | 35 | " |
| 35 | 36 | ||
| 36 | SRC_URI:append:libc-musl = " \ | 37 | SRC_URI:append:libc-musl = " \ |
