]> code.ossystems Code Review - openembedded-core.git/commitdiff
glibc: CVE-2017-15670
authorThiruvadi Rajaraman <trajaraman@mvista.com>
Thu, 16 Nov 2017 13:01:26 +0000 (18:31 +0530)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 8 Dec 2017 16:35:59 +0000 (16:35 +0000)
Source: git://sourceware.org/git/glibc.git
MR: 76647
Type: Security Fix
Disposition: Backport from glibc-2.27
ChangeID: f4494e472d36748c2b3171a91640b26c638f6e0b
Description:

CVE-2017-15670: glob: Fix one-byte overflow [BZ #22320]
Affects: glibc < 2.27

Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
Reviewed-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Armin Kuster <akuster@mvista.com>
meta/recipes-core/glibc/glibc/CVE-2017-15670.patch [new file with mode: 0644]
meta/recipes-core/glibc/glibc_2.24.bb

diff --git a/meta/recipes-core/glibc/glibc/CVE-2017-15670.patch b/meta/recipes-core/glibc/glibc/CVE-2017-15670.patch
new file mode 100644 (file)
index 0000000..b606cc2
--- /dev/null
@@ -0,0 +1,38 @@
+commit a76376df7c07e577a9515c3faa5dbd50bda5da07
+Author: Paul Eggert <eggert@cs.ucla.edu>
+Date:   Fri Oct 20 18:41:14 2017 +0200
+
+    CVE-2017-15670: glob: Fix one-byte overflow [BZ #22320]
+    
+Upstream-Status: Backport
+
+CVE: CVE-2017-15670
+Signed-off-by: Thiruvadi Rajaraman <trajaraman@mvista.com>
+
+Index: git/ChangeLog
+===================================================================
+--- git.orig/ChangeLog 2017-11-16 18:12:32.457928327 +0530
++++ git/ChangeLog      2017-11-16 18:18:24.423642908 +0530
+@@ -1,3 +1,9 @@
++2017-10-20  Paul Eggert <eggert@cs.ucla.edu>
++
++       [BZ #22320]
++       CVE-2017-15670
++       * posix/glob.c (__glob): Fix one-byte overflow.
++
+ 2017-05-05  Florian Weimer  <fweimer@redhat.com>
+       [BZ #21461]
+Index: git/posix/glob.c
+===================================================================
+--- git.orig/posix/glob.c      2017-11-16 18:12:14.833843602 +0530
++++ git/posix/glob.c   2017-11-16 18:16:39.511127432 +0530
+@@ -856,7 +856,7 @@
+                 *p = '\0';
+               }
+             else
+-              *((char *) mempcpy (newp, dirname + 1, end_name - dirname))
++              *((char *) mempcpy (newp, dirname + 1, end_name - dirname - 1))
+                 = '\0';
+             user_name = newp;
+           }
index 966be34405c2f4e64c8679d996de684425439b33..6ea45857d28a343b1b4fe0037934893280f6728d 100644 (file)
@@ -57,6 +57,7 @@ SRC_URI += "\
            file://generate-supported.mk \
            file://0001-locale-fix-hard-coded-reference-to-gcc-E.patch \
            file://CVE-2017-8804.patch \
+           file://CVE-2017-15670.patch \
            "
 
 SRC_URI_append_class-nativesdk = "\