diff options
| author | Soumya Sambu <soumya.sambu@windriver.com> | 2024-08-25 18:27:43 +0000 |
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2024-08-25 11:29:14 -0700 |
| commit | 4bd9d757c10265dbf75034b50504ad7340ae3012 (patch) | |
| tree | 16b2a67e7f0bcd7e1426735312c9e4ec75268ea7 /meta-oe/recipes-gnome/gtk+ | |
| parent | 58a923c96877e5d6cf434d2d69108c5da1c3f552 (diff) | |
| download | meta-openembedded-4bd9d757c10265dbf75034b50504ad7340ae3012.tar.gz | |
gtk+: Fix CVE-2024-6655
A flaw was found in the GTK library. Under certain conditions, it is possible for a
library to be injected into a GTK application from the current working directory.
References:
https://nvd.nist.gov/vuln/detail/CVE-2024-6655
Upstream-patch:
https://gitlab.gnome.org/GNOME/gtk/-/commit/3bbf0b6176d42836d23c36a6ac410e807ec0a7a7
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-oe/recipes-gnome/gtk+')
| -rw-r--r-- | meta-oe/recipes-gnome/gtk+/gtk+/CVE-2024-6655.patch | 40 | ||||
| -rw-r--r-- | meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb | 1 |
2 files changed, 41 insertions, 0 deletions
diff --git a/meta-oe/recipes-gnome/gtk+/gtk+/CVE-2024-6655.patch b/meta-oe/recipes-gnome/gtk+/gtk+/CVE-2024-6655.patch new file mode 100644 index 0000000000..dfa54f2f31 --- /dev/null +++ b/meta-oe/recipes-gnome/gtk+/gtk+/CVE-2024-6655.patch | |||
| @@ -0,0 +1,40 @@ | |||
| 1 | From 3bbf0b6176d42836d23c36a6ac410e807ec0a7a7 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Matthias Clasen <mclasen@redhat.com> | ||
| 3 | Date: Sat, 15 Jun 2024 14:18:01 -0400 | ||
| 4 | Subject: [PATCH] Stop looking for modules in cwd | ||
| 5 | |||
| 6 | This is just not a good idea. It is surprising, and can be misused. | ||
| 7 | |||
| 8 | Fixes: #6786 | ||
| 9 | |||
| 10 | CVE: CVE-2024-6655 | ||
| 11 | |||
| 12 | Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/gtk/-/commit/3bbf0b6176d42836d23c36a6ac410e807ec0a7a7] | ||
| 13 | |||
| 14 | Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> | ||
| 15 | --- | ||
| 16 | gtk/gtkmodules.c | 9 ++------- | ||
| 17 | 1 file changed, 2 insertions(+), 7 deletions(-) | ||
| 18 | |||
| 19 | diff --git a/gtk/gtkmodules.c b/gtk/gtkmodules.c | ||
| 20 | index e09b583..e75810c 100644 | ||
| 21 | --- a/gtk/gtkmodules.c | ||
| 22 | +++ b/gtk/gtkmodules.c | ||
| 23 | @@ -225,13 +225,8 @@ find_module (const gchar *name) | ||
| 24 | gchar *module_name; | ||
| 25 | |||
| 26 | module_name = _gtk_find_module (name, "modules"); | ||
| 27 | - if (!module_name) | ||
| 28 | - { | ||
| 29 | - /* As last resort, try loading without an absolute path (using system | ||
| 30 | - * library path) | ||
| 31 | - */ | ||
| 32 | - module_name = g_module_build_path (NULL, name); | ||
| 33 | - } | ||
| 34 | + if (module_name == NULL) | ||
| 35 | + return NULL; | ||
| 36 | |||
| 37 | module = g_module_open (module_name, G_MODULE_BIND_LOCAL | G_MODULE_BIND_LAZY); | ||
| 38 | |||
| 39 | -- | ||
| 40 | 2.40.0 | ||
diff --git a/meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb b/meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb index 74b0531414..d55aa8d285 100644 --- a/meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb +++ b/meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb | |||
| @@ -11,6 +11,7 @@ SRC_URI = "http://ftp.gnome.org/pub/gnome/sources/gtk+/2.24/gtk+-${PV}.tar.xz \ | |||
| 11 | file://strict-prototypes.patch \ | 11 | file://strict-prototypes.patch \ |
| 12 | file://0001-Do-not-look-into-HOME-when-looking-for-gtk-modules.patch \ | 12 | file://0001-Do-not-look-into-HOME-when-looking-for-gtk-modules.patch \ |
| 13 | file://0001-Fix-signature-of-create_menu-function.patch \ | 13 | file://0001-Fix-signature-of-create_menu-function.patch \ |
| 14 | file://CVE-2024-6655.patch \ | ||
| 14 | " | 15 | " |
| 15 | 16 | ||
| 16 | SRC_URI[sha256sum] = "ac2ac757f5942d318a311a54b0c80b5ef295f299c2a73c632f6bfb1ff49cc6da" | 17 | SRC_URI[sha256sum] = "ac2ac757f5942d318a311a54b0c80b5ef295f299c2a73c632f6bfb1ff49cc6da" |
