diff options
| author | Armin Kuster <akuster808@gmail.com> | 2018-01-20 09:50:26 -0800 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-01-25 11:36:25 +0000 |
| commit | 850df2c3a83f4334b6b4b3ab89b1cd53c7cd9be9 (patch) | |
| tree | bb340c2971dce877805171c2fed86543f1c5cdea | |
| parent | 334ddc5c784a346050b304642658f356f09dfa4f (diff) | |
| download | poky-850df2c3a83f4334b6b4b3ab89b1cd53c7cd9be9.tar.gz | |
glibc: Security fix CVE-2017-17426
affects < 2.27
including current mastet git hash: 77f921dac17c5fa99bd9e926d926c327982895f7
(From OE-Core rev: 050fecc47c84e1a052a6e33414fbcfeef1e59f7a)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
| -rw-r--r-- | meta/recipes-core/glibc/glibc/CVE-2017-17426.patch | 80 | ||||
| -rw-r--r-- | meta/recipes-core/glibc/glibc_2.26.bb | 1 |
2 files changed, 81 insertions, 0 deletions
diff --git a/meta/recipes-core/glibc/glibc/CVE-2017-17426.patch b/meta/recipes-core/glibc/glibc/CVE-2017-17426.patch new file mode 100644 index 0000000000..c7d1cb86df --- /dev/null +++ b/meta/recipes-core/glibc/glibc/CVE-2017-17426.patch | |||
| @@ -0,0 +1,80 @@ | |||
| 1 | From df8c219cb987cfe85c550efa693a1383a11e38aa Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Arjun Shankar <arjun@redhat.com> | ||
| 3 | Date: Thu, 30 Nov 2017 13:31:45 +0100 | ||
| 4 | Subject: [PATCH] Fix integer overflow in malloc when tcache is enabled [BZ | ||
| 5 | #22375] | ||
| 6 | |||
| 7 | When the per-thread cache is enabled, __libc_malloc uses request2size (which | ||
| 8 | does not perform an overflow check) to calculate the chunk size from the | ||
| 9 | requested allocation size. This leads to an integer overflow causing malloc | ||
| 10 | to incorrectly return the last successfully allocated block when called with | ||
| 11 | a very large size argument (close to SIZE_MAX). | ||
| 12 | |||
| 13 | This commit uses checked_request2size instead, removing the overflow. | ||
| 14 | |||
| 15 | (cherry picked from commit 34697694e8a93b325b18f25f7dcded55d6baeaf6) | ||
| 16 | |||
| 17 | Upstream-Status: Backport | ||
| 18 | CVE: CVE-2017-17426 | ||
| 19 | Signed-off-by: Armin Kuster <akuster@mvista.com> | ||
| 20 | |||
| 21 | --- | ||
| 22 | ChangeLog | 7 +++++++ | ||
| 23 | NEWS | 6 ++++++ | ||
| 24 | malloc/malloc.c | 3 ++- | ||
| 25 | 3 files changed, 15 insertions(+), 1 deletion(-) | ||
| 26 | |||
| 27 | Index: git/NEWS | ||
| 28 | =================================================================== | ||
| 29 | --- git.orig/NEWS | ||
| 30 | +++ git/NEWS | ||
| 31 | @@ -4,6 +4,8 @@ See the end for copying conditions. | ||
| 32 | |||
| 33 | Please send GNU C library bug reports via <http://sourceware.org/bugzilla/> | ||
| 34 | using `glibc' in the "product" field. | ||
| 35 | + | ||
| 36 | +[22375] malloc returns pointer from tcache instead of NULL (CVE-2017-17426) | ||
| 37 | |||
| 38 | Version 2.26 | ||
| 39 | |||
| 40 | @@ -215,6 +217,11 @@ Security related changes: | ||
| 41 | for AT_SECURE or SUID binaries could be used to load libraries from the | ||
| 42 | current directory. | ||
| 43 | |||
| 44 | + CVE-2017-17426: The malloc function, when called with an object size near | ||
| 45 | + the value SIZE_MAX, would return a pointer to a buffer which is too small, | ||
| 46 | + instead of NULL. This was a regression introduced with the new malloc | ||
| 47 | + thread cache in glibc 2.26. Reported by Iain Buclaw. | ||
| 48 | + | ||
| 49 | The following bugs are resolved with this release: | ||
| 50 | |||
| 51 | [984] network: Respond to changed resolv.conf in gethostbyname | ||
| 52 | Index: git/malloc/malloc.c | ||
| 53 | =================================================================== | ||
| 54 | --- git.orig/malloc/malloc.c | ||
| 55 | +++ git/malloc/malloc.c | ||
| 56 | @@ -3050,7 +3050,8 @@ __libc_malloc (size_t bytes) | ||
| 57 | return (*hook)(bytes, RETURN_ADDRESS (0)); | ||
| 58 | #if USE_TCACHE | ||
| 59 | /* int_free also calls request2size, be careful to not pad twice. */ | ||
| 60 | - size_t tbytes = request2size (bytes); | ||
| 61 | + size_t tbytes; | ||
| 62 | + checked_request2size (bytes, tbytes); | ||
| 63 | size_t tc_idx = csize2tidx (tbytes); | ||
| 64 | |||
| 65 | MAYBE_INIT_TCACHE (); | ||
| 66 | Index: git/ChangeLog | ||
| 67 | =================================================================== | ||
| 68 | --- git.orig/ChangeLog | ||
| 69 | +++ git/ChangeLog | ||
| 70 | @@ -1,3 +1,10 @@ | ||
| 71 | +2017-11-30 Arjun Shankar <arjun@redhat.com> | ||
| 72 | + | ||
| 73 | + [BZ #22375] | ||
| 74 | + CVE-2017-17426 | ||
| 75 | + * malloc/malloc.c (__libc_malloc): Use checked_request2size | ||
| 76 | + instead of request2size. | ||
| 77 | + | ||
| 78 | 2017-12-30 Aurelien Jarno <aurelien@aurel32.net> | ||
| 79 | Dmitry V. Levin <ldv@altlinux.org> | ||
| 80 | |||
diff --git a/meta/recipes-core/glibc/glibc_2.26.bb b/meta/recipes-core/glibc/glibc_2.26.bb index caf8e37189..cc7d3cd596 100644 --- a/meta/recipes-core/glibc/glibc_2.26.bb +++ b/meta/recipes-core/glibc/glibc_2.26.bb | |||
| @@ -47,6 +47,7 @@ SRC_URI = "${GLIBC_GIT_URI};branch=${SRCBRANCH};name=glibc \ | |||
| 47 | file://CVE-2017-15671.patch \ | 47 | file://CVE-2017-15671.patch \ |
| 48 | file://0029-assert-Support-types-without-operator-int-BZ-21972.patch \ | 48 | file://0029-assert-Support-types-without-operator-int-BZ-21972.patch \ |
| 49 | file://CVE-2017-16997.patch \ | 49 | file://CVE-2017-16997.patch \ |
| 50 | file://CVE-2017-17426.patch \ | ||
| 50 | " | 51 | " |
| 51 | 52 | ||
| 52 | NATIVESDKFIXES ?= "" | 53 | NATIVESDKFIXES ?= "" |
