diff options
| author | Vijay Anusuri <vanusuri@mvista.com> | 2024-11-14 18:09:03 +0530 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2024-11-27 06:27:25 -0800 |
| commit | 3be25b503f789bde65e822ed835f7d81f6670858 (patch) | |
| tree | 4fb2622af8f594d9e4eb5c4cf59a942d6edfff95 | |
| parent | c1d55bc34963295328a6e001113818d2f12e6a3e (diff) | |
| download | poky-3be25b503f789bde65e822ed835f7d81f6670858.tar.gz | |
glib-2.0: Backport fix for CVE-2024-52533
Upstream-Status: Backport from https://gitlab.gnome.org/GNOME/glib/-/commit/ec0b708b981af77fef8e4bbb603cde4de4cd2e29
Reference: https://security-tracker.debian.org/tracker/CVE-2024-52533
(From OE-Core rev: c7ecdd6530e18efd651e2ea57565481f66f7b1cf)
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
| -rw-r--r-- | meta/recipes-core/glib-2.0/glib-2.0/CVE-2024-52533.patch | 49 | ||||
| -rw-r--r-- | meta/recipes-core/glib-2.0/glib-2.0_2.72.3.bb | 1 |
2 files changed, 50 insertions, 0 deletions
diff --git a/meta/recipes-core/glib-2.0/glib-2.0/CVE-2024-52533.patch b/meta/recipes-core/glib-2.0/glib-2.0/CVE-2024-52533.patch new file mode 100644 index 0000000000..3a06a9d782 --- /dev/null +++ b/meta/recipes-core/glib-2.0/glib-2.0/CVE-2024-52533.patch | |||
| @@ -0,0 +1,49 @@ | |||
| 1 | From ec0b708b981af77fef8e4bbb603cde4de4cd2e29 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Michael Catanzaro <mcatanzaro@redhat.com> | ||
| 3 | Date: Thu, 19 Sep 2024 18:35:53 +0100 | ||
| 4 | Subject: [PATCH] gsocks4aproxy: Fix a single byte buffer overflow in connect | ||
| 5 | messages | ||
| 6 | |||
| 7 | `SOCKS4_CONN_MSG_LEN` failed to account for the length of the final nul | ||
| 8 | byte in the connect message, which is an addition in SOCKSv4a vs | ||
| 9 | SOCKSv4. | ||
| 10 | |||
| 11 | This means that the buffer for building and transmitting the connect | ||
| 12 | message could be overflowed if the username and hostname are both | ||
| 13 | `SOCKS4_MAX_LEN` (255) bytes long. | ||
| 14 | |||
| 15 | Proxy configurations are normally statically configured, so the username | ||
| 16 | is very unlikely to be near its maximum length, and hence this overflow | ||
| 17 | is unlikely to be triggered in practice. | ||
| 18 | |||
| 19 | (Commit message by Philip Withnall, diagnosis and fix by Michael | ||
| 20 | Catanzaro.) | ||
| 21 | |||
| 22 | Fixes: #3461 | ||
| 23 | |||
| 24 | Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/glib/-/commit/ec0b708b981af77fef8e4bbb603cde4de4cd2e29] | ||
| 25 | CVE: CVE-2024-52533 | ||
| 26 | Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> | ||
| 27 | --- | ||
| 28 | gio/gsocks4aproxy.c | 4 ++-- | ||
| 29 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
| 30 | |||
| 31 | diff --git a/gio/gsocks4aproxy.c b/gio/gsocks4aproxy.c | ||
| 32 | index 3dad118eb7..b3146d08fd 100644 | ||
| 33 | --- a/gio/gsocks4aproxy.c | ||
| 34 | +++ b/gio/gsocks4aproxy.c | ||
| 35 | @@ -79,9 +79,9 @@ g_socks4a_proxy_init (GSocks4aProxy *proxy) | ||
| 36 | * +----+----+----+----+----+----+----+----+----+----+....+----+------+....+------+ | ||
| 37 | * | VN | CD | DSTPORT | DSTIP | USERID |NULL| HOST | | NULL | | ||
| 38 | * +----+----+----+----+----+----+----+----+----+----+....+----+------+....+------+ | ||
| 39 | - * 1 1 2 4 variable 1 variable | ||
| 40 | + * 1 1 2 4 variable 1 variable 1 | ||
| 41 | */ | ||
| 42 | -#define SOCKS4_CONN_MSG_LEN (9 + SOCKS4_MAX_LEN * 2) | ||
| 43 | +#define SOCKS4_CONN_MSG_LEN (10 + SOCKS4_MAX_LEN * 2) | ||
| 44 | static gint | ||
| 45 | set_connect_msg (guint8 *msg, | ||
| 46 | const gchar *hostname, | ||
| 47 | -- | ||
| 48 | GitLab | ||
| 49 | |||
diff --git a/meta/recipes-core/glib-2.0/glib-2.0_2.72.3.bb b/meta/recipes-core/glib-2.0/glib-2.0_2.72.3.bb index 239099d568..8007de0613 100644 --- a/meta/recipes-core/glib-2.0/glib-2.0_2.72.3.bb +++ b/meta/recipes-core/glib-2.0/glib-2.0_2.72.3.bb | |||
| @@ -50,6 +50,7 @@ SRC_URI = "${GNOME_MIRROR}/glib/${SHRT_VER}/glib-${PV}.tar.xz \ | |||
| 50 | file://CVE-2024-34397_17.patch \ | 50 | file://CVE-2024-34397_17.patch \ |
| 51 | file://CVE-2024-34397_18.patch \ | 51 | file://CVE-2024-34397_18.patch \ |
| 52 | file://0001-gvariant-serialiser-Convert-endianness-of-offsets.patch \ | 52 | file://0001-gvariant-serialiser-Convert-endianness-of-offsets.patch \ |
| 53 | file://CVE-2024-52533.patch \ | ||
| 53 | " | 54 | " |
| 54 | SRC_URI:append:class-native = " file://relocate-modules.patch" | 55 | SRC_URI:append:class-native = " file://relocate-modules.patch" |
| 55 | 56 | ||
