diff options
| author | Gianfranco <costamagna.gianfranco@gmail.com> | 2020-12-02 10:19:37 +0100 |
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2020-12-02 11:21:18 -0800 |
| commit | a039c0ed2ca4e2289225ef2371024adc98c213b1 (patch) | |
| tree | 776556468c34dd5a1721fe537745fa4ea1066431 | |
| parent | fb5e3d44d0e34c26e752e60344cf5e2ae527e786 (diff) | |
| download | meta-openembedded-a039c0ed2ca4e2289225ef2371024adc98c213b1.tar.gz | |
dlt-daemon: add upstream patch to fix CVE-2020-29394
More information on: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976228
| A buffer overflow in the dlt_filter_load function in dlt_common.c in
| dlt-daemon 2.8.5 (GENIVI Diagnostic Log and Trace) allows arbitrary
| code execution because fscanf is misused (no limit on the number of
| characters to be read in a format argument).
Signed-off-by: Gianfranco Costamagna <costamagnagianfranco@yahoo.it>
Signed-off-by: Gianfranco Costamagna <locutusofborg@debian.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
| -rw-r--r-- | meta-oe/recipes-extended/dlt-daemon/dlt-daemon/275.patch | 38 | ||||
| -rw-r--r-- | meta-oe/recipes-extended/dlt-daemon/dlt-daemon_2.18.5.bb | 1 |
2 files changed, 39 insertions, 0 deletions
diff --git a/meta-oe/recipes-extended/dlt-daemon/dlt-daemon/275.patch b/meta-oe/recipes-extended/dlt-daemon/dlt-daemon/275.patch new file mode 100644 index 0000000000..75065eb054 --- /dev/null +++ b/meta-oe/recipes-extended/dlt-daemon/dlt-daemon/275.patch | |||
| @@ -0,0 +1,38 @@ | |||
| 1 | Upstream-status: Backport | ||
| 2 | CVE: CVE-2020-29394 | ||
| 3 | From 7f5cd5404a03fa330e192084f6bdafb2dc9bdcb7 Mon Sep 17 00:00:00 2001 | ||
| 4 | From: GwanYeong Kim <gy741.kim@gmail.com> | ||
| 5 | Date: Sat, 28 Nov 2020 12:24:46 +0900 | ||
| 6 | Subject: [PATCH] dlt_common: Fix buffer overflow in dlt_filter_load | ||
| 7 | |||
| 8 | A buffer overflow in the dlt_filter_load function in dlt_common.c in dlt-daemon allows arbitrary code execution via an unsafe usage of fscanf, because it does not limit the number of characters to be read in a format argument. | ||
| 9 | |||
| 10 | Fixed: #274 | ||
| 11 | |||
| 12 | Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com> | ||
| 13 | --- | ||
| 14 | src/shared/dlt_common.c | 4 ++-- | ||
| 15 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
| 16 | |||
| 17 | diff --git a/src/shared/dlt_common.c b/src/shared/dlt_common.c | ||
| 18 | index 254f4ce4..d15b1cec 100644 | ||
| 19 | --- a/src/shared/dlt_common.c | ||
| 20 | +++ b/src/shared/dlt_common.c | ||
| 21 | @@ -404,7 +404,7 @@ DltReturnValue dlt_filter_load(DltFilter *filter, const char *filename, int verb | ||
| 22 | while (!feof(handle)) { | ||
| 23 | str1[0] = 0; | ||
| 24 | |||
| 25 | - if (fscanf(handle, "%s", str1) != 1) | ||
| 26 | + if (fscanf(handle, "%254s", str1) != 1) | ||
| 27 | break; | ||
| 28 | |||
| 29 | if (str1[0] == 0) | ||
| 30 | @@ -419,7 +419,7 @@ DltReturnValue dlt_filter_load(DltFilter *filter, const char *filename, int verb | ||
| 31 | |||
| 32 | str1[0] = 0; | ||
| 33 | |||
| 34 | - if (fscanf(handle, "%s", str1) != 1) | ||
| 35 | + if (fscanf(handle, "%254s", str1) != 1) | ||
| 36 | break; | ||
| 37 | |||
| 38 | if (str1[0] == 0) | ||
diff --git a/meta-oe/recipes-extended/dlt-daemon/dlt-daemon_2.18.5.bb b/meta-oe/recipes-extended/dlt-daemon/dlt-daemon_2.18.5.bb index f3fcee4d20..5066e76d34 100644 --- a/meta-oe/recipes-extended/dlt-daemon/dlt-daemon_2.18.5.bb +++ b/meta-oe/recipes-extended/dlt-daemon/dlt-daemon_2.18.5.bb | |||
| @@ -19,6 +19,7 @@ SRC_URI = "git://github.com/GENIVI/${BPN}.git;protocol=https \ | |||
| 19 | file://0004-Modify-systemd-config-directory.patch \ | 19 | file://0004-Modify-systemd-config-directory.patch \ |
| 20 | file://241.patch \ | 20 | file://241.patch \ |
| 21 | file://245.patch \ | 21 | file://245.patch \ |
| 22 | file://275.patch \ | ||
| 22 | " | 23 | " |
| 23 | SRCREV = "f1ac087c766827b1d0ed9c3a814b3cc052e948f2" | 24 | SRCREV = "f1ac087c766827b1d0ed9c3a814b3cc052e948f2" |
| 24 | 25 | ||
