summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-gnome/gtk+
diff options
context:
space:
mode:
authorSoumya Sambu <soumya.sambu@windriver.com>2024-08-25 18:27:43 +0000
committerKhem Raj <raj.khem@gmail.com>2024-08-25 11:29:14 -0700
commit4bd9d757c10265dbf75034b50504ad7340ae3012 (patch)
tree16b2a67e7f0bcd7e1426735312c9e4ec75268ea7 /meta-oe/recipes-gnome/gtk+
parent58a923c96877e5d6cf434d2d69108c5da1c3f552 (diff)
downloadmeta-openembedded-4bd9d757c10265dbf75034b50504ad7340ae3012.tar.gz
gtk+: Fix CVE-2024-6655
A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory. References: https://nvd.nist.gov/vuln/detail/CVE-2024-6655 Upstream-patch: https://gitlab.gnome.org/GNOME/gtk/-/commit/3bbf0b6176d42836d23c36a6ac410e807ec0a7a7 Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-oe/recipes-gnome/gtk+')
-rw-r--r--meta-oe/recipes-gnome/gtk+/gtk+/CVE-2024-6655.patch40
-rw-r--r--meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb1
2 files changed, 41 insertions, 0 deletions
diff --git a/meta-oe/recipes-gnome/gtk+/gtk+/CVE-2024-6655.patch b/meta-oe/recipes-gnome/gtk+/gtk+/CVE-2024-6655.patch
new file mode 100644
index 0000000000..dfa54f2f31
--- /dev/null
+++ b/meta-oe/recipes-gnome/gtk+/gtk+/CVE-2024-6655.patch
@@ -0,0 +1,40 @@
1From 3bbf0b6176d42836d23c36a6ac410e807ec0a7a7 Mon Sep 17 00:00:00 2001
2From: Matthias Clasen <mclasen@redhat.com>
3Date: Sat, 15 Jun 2024 14:18:01 -0400
4Subject: [PATCH] Stop looking for modules in cwd
5
6This is just not a good idea. It is surprising, and can be misused.
7
8Fixes: #6786
9
10CVE: CVE-2024-6655
11
12Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/gtk/-/commit/3bbf0b6176d42836d23c36a6ac410e807ec0a7a7]
13
14Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
15---
16 gtk/gtkmodules.c | 9 ++-------
17 1 file changed, 2 insertions(+), 7 deletions(-)
18
19diff --git a/gtk/gtkmodules.c b/gtk/gtkmodules.c
20index e09b583..e75810c 100644
21--- a/gtk/gtkmodules.c
22+++ b/gtk/gtkmodules.c
23@@ -225,13 +225,8 @@ find_module (const gchar *name)
24 gchar *module_name;
25
26 module_name = _gtk_find_module (name, "modules");
27- if (!module_name)
28- {
29- /* As last resort, try loading without an absolute path (using system
30- * library path)
31- */
32- module_name = g_module_build_path (NULL, name);
33- }
34+ if (module_name == NULL)
35+ return NULL;
36
37 module = g_module_open (module_name, G_MODULE_BIND_LOCAL | G_MODULE_BIND_LAZY);
38
39--
402.40.0
diff --git a/meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb b/meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb
index 74b0531414..d55aa8d285 100644
--- a/meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb
+++ b/meta-oe/recipes-gnome/gtk+/gtk+_2.24.33.bb
@@ -11,6 +11,7 @@ SRC_URI = "http://ftp.gnome.org/pub/gnome/sources/gtk+/2.24/gtk+-${PV}.tar.xz \
11 file://strict-prototypes.patch \ 11 file://strict-prototypes.patch \
12 file://0001-Do-not-look-into-HOME-when-looking-for-gtk-modules.patch \ 12 file://0001-Do-not-look-into-HOME-when-looking-for-gtk-modules.patch \
13 file://0001-Fix-signature-of-create_menu-function.patch \ 13 file://0001-Fix-signature-of-create_menu-function.patch \
14 file://CVE-2024-6655.patch \
14 " 15 "
15 16
16SRC_URI[sha256sum] = "ac2ac757f5942d318a311a54b0c80b5ef295f299c2a73c632f6bfb1ff49cc6da" 17SRC_URI[sha256sum] = "ac2ac757f5942d318a311a54b0c80b5ef295f299c2a73c632f6bfb1ff49cc6da"