diff options
author | Adrian Freihofer <adrian.freihofer@gmail.com> | 2023-08-16 12:58:20 +0200 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2023-08-19 05:56:58 -1000 |
commit | 3d4850b3eac151a17bb174f18f8dda4707dc104f (patch) | |
tree | 060ba97a183ac830c4778183b8b9e829ccb4fe17 /scripts/lib | |
parent | 5eab65275dc9faa0b9a4371d5bcb6e95cfda61cd (diff) | |
download | poky-3d4850b3eac151a17bb174f18f8dda4707dc104f.tar.gz |
dmidecode: fixup for CVE-2023-30630
The previous CVE-2023-30630_1.patch picked only the patch
"dmidecode: Write the whole dump file at once" d8cfbc808f.
But there was a refactoring which does not allow to cherry-pick it fast
forward. Resolving this conflict was not correctly done. The patch was:
+ u32 len;
+ u8 *table;
...
- if (!(opt.flags & FLAG_QUIET))
- pr_comment("Writing %d bytes to %s.", crafted[0x05],
- opt.dumpfile);
- write_dump(0, crafted[0x05], crafted, opt.dumpfile, 1);
+ dmi_table_dump(crafted, crafted[0x05], table, len);
It looks like the variables len and table have been added without
initialization.
Now this problem is solved by applying the previous refactoring as
well. Patch 1 gets replaced by Patch 1a and Patch 1b. Patch 2..4 are
rebased without changes.
(From OE-Core rev: ea069a94a213cc153528aebfc387f30215566cc7)
Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/lib')
0 files changed, 0 insertions, 0 deletions