diff options
| author | Wang Mingyu <wangmy@fujitsu.com> | 2023-08-01 15:41:18 +0800 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2023-09-04 04:13:24 -1000 |
| commit | a93099cb199f480a6287fb586ae609771a5ed160 (patch) | |
| tree | 892f265b6316fd3123aee2a3c2d2b1e0cea654ac | |
| parent | 78aa33756044f15dbe5bd863b90f801f5cdafda9 (diff) | |
| download | poky-a93099cb199f480a6287fb586ae609771a5ed160.tar.gz | |
tar: upgrade 1.34 -> 1.35
CVE-2022-48303.patch
removed since it's included in 1.35
License-Update: http changed to https
Changelog:
===========
* Fail when building GNU tar, if the platform supports 64-bit time_t
but the build uses only 32-bit time_t.
* Leave the devmajor and devminor fields empty (rather than zero) for
non-special files, as this is more compatible with traditional tar.
* Bug fixes
** Fix interaction of --update with --wildcards.
** When extracting archives into an empty directory, do not create
hard links to files outside that directory.
** Handle partial reads from regular files.
** Warn "file changed as we read it" less often.
** Fix --ignore-failed-read to ignore file-changed read errors
** Fix --remove-files to not remove a file that changed while we read it.
** Fix --atime-preserve=replace to not fail if there was no need to replace,
either because we did not read the file, or the atime did not change.
** Fix race when creating a parent directory while another process is
also doing so.
** Fix handling of prefix keywords not followed by "." in pax headers.
** Fix handling of out-of-range sparse entries in pax headers.
** Fix handling of --transform='s/s/@/2'.
** Fix treatment of options ending in / in files-from list.
** Fix crash on 'tar --checkpoint-action exec=\"'.
** Fix low-memory crash when reading incremental dumps.
** Fix --exclude-vcs-ignores memory allocation misuse.
(From OE-Core rev: d85a7394a1efa8b644950b8d6edbc5e9917ce8b0)
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit c63769de05ce08c0627d302d14316ced31816b4d)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
| -rw-r--r-- | meta/recipes-extended/tar/tar/CVE-2022-48303.patch | 43 | ||||
| -rw-r--r-- | meta/recipes-extended/tar/tar_1.35.bb (renamed from meta/recipes-extended/tar/tar_1.34.bb) | 8 |
2 files changed, 3 insertions, 48 deletions
diff --git a/meta/recipes-extended/tar/tar/CVE-2022-48303.patch b/meta/recipes-extended/tar/tar/CVE-2022-48303.patch deleted file mode 100644 index b2f40f3e64..0000000000 --- a/meta/recipes-extended/tar/tar/CVE-2022-48303.patch +++ /dev/null | |||
| @@ -1,43 +0,0 @@ | |||
| 1 | From 3da78400eafcccb97e2f2fd4b227ea40d794ede8 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Sergey Poznyakoff <gray@gnu.org> | ||
| 3 | Date: Sat, 11 Feb 2023 11:57:39 +0200 | ||
| 4 | Subject: Fix boundary checking in base-256 decoder | ||
| 5 | |||
| 6 | * src/list.c (from_header): Base-256 encoding is at least 2 bytes | ||
| 7 | long. | ||
| 8 | |||
| 9 | Upstream-Status: Backport [see reference below] | ||
| 10 | CVE: CVE-2022-48303 | ||
| 11 | |||
| 12 | Reference to upstream patch: | ||
| 13 | https://savannah.gnu.org/bugs/?62387 | ||
| 14 | https://git.savannah.gnu.org/cgit/tar.git/patch/src/list.c?id=3da78400eafcccb97e2f2fd4b227ea40d794ede8 | ||
| 15 | |||
| 16 | Signed-off-by: Rodolfo Quesada Zumbado <rodolfo.zumbado@windriver.com> | ||
| 17 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
| 18 | --- | ||
| 19 | src/list.c | 5 +++-- | ||
| 20 | 1 file changed, 3 insertions(+), 2 deletions(-)Signed-off-by: Rodolfo Quesada Zumbado <rodolfo.zumbado@windriver.com> | ||
| 21 | |||
| 22 | |||
| 23 | (limited to 'src/list.c') | ||
| 24 | |||
| 25 | diff --git a/src/list.c b/src/list.c | ||
| 26 | index 9fafc42..86bcfdd 100644 | ||
| 27 | --- a/src/list.c | ||
| 28 | +++ b/src/list.c | ||
| 29 | @@ -881,8 +881,9 @@ from_header (char const *where0, size_t digs, char const *type, | ||
| 30 | where++; | ||
| 31 | } | ||
| 32 | } | ||
| 33 | - else if (*where == '\200' /* positive base-256 */ | ||
| 34 | - || *where == '\377' /* negative base-256 */) | ||
| 35 | + else if (where <= lim - 2 | ||
| 36 | + && (*where == '\200' /* positive base-256 */ | ||
| 37 | + || *where == '\377' /* negative base-256 */)) | ||
| 38 | { | ||
| 39 | /* Parse base-256 output. A nonnegative number N is | ||
| 40 | represented as (256**DIGS)/2 + N; a negative number -N is | ||
| 41 | -- | ||
| 42 | cgit v1.1 | ||
| 43 | |||
diff --git a/meta/recipes-extended/tar/tar_1.34.bb b/meta/recipes-extended/tar/tar_1.35.bb index 1ef5fe221e..4dbd418b60 100644 --- a/meta/recipes-extended/tar/tar_1.34.bb +++ b/meta/recipes-extended/tar/tar_1.35.bb | |||
| @@ -4,13 +4,11 @@ or disk archive, and can restore individual files from the archive." | |||
| 4 | HOMEPAGE = "http://www.gnu.org/software/tar/" | 4 | HOMEPAGE = "http://www.gnu.org/software/tar/" |
| 5 | SECTION = "base" | 5 | SECTION = "base" |
| 6 | LICENSE = "GPL-3.0-only" | 6 | LICENSE = "GPL-3.0-only" |
| 7 | LIC_FILES_CHKSUM = "file://COPYING;md5=d32239bcb673463ab874e80d47fae504" | 7 | LIC_FILES_CHKSUM = "file://COPYING;md5=1ebbd3e34237af26da5dc08a4e440464" |
| 8 | 8 | ||
| 9 | SRC_URI = "${GNU_MIRROR}/tar/tar-${PV}.tar.bz2 \ | 9 | SRC_URI = "${GNU_MIRROR}/tar/tar-${PV}.tar.bz2" |
| 10 | file://CVE-2022-48303.patch \ | ||
| 11 | " | ||
| 12 | 10 | ||
| 13 | SRC_URI[sha256sum] = "b44cc67f8a1f6b0250b7c860e952b37e8ed932a90bd9b1862a511079255646ff" | 11 | SRC_URI[sha256sum] = "7edb8886a3dc69420a1446e1e2d061922b642f1cf632d2cd0f9ee7e690775985" |
| 14 | 12 | ||
| 15 | inherit autotools gettext texinfo | 13 | inherit autotools gettext texinfo |
| 16 | 14 | ||
