]> code.ossystems Code Review - openembedded-core.git/commitdiff
gmp: fix CVE-2021-43618
authorRoss Burton <ross@burtonini.com>
Mon, 22 Nov 2021 11:40:56 +0000 (11:40 +0000)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 23 Nov 2021 10:53:12 +0000 (10:53 +0000)
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-support/gmp/gmp/cve-2021-43618.patch [new file with mode: 0644]
meta/recipes-support/gmp/gmp_6.2.1.bb

diff --git a/meta/recipes-support/gmp/gmp/cve-2021-43618.patch b/meta/recipes-support/gmp/gmp/cve-2021-43618.patch
new file mode 100644 (file)
index 0000000..095fb21
--- /dev/null
@@ -0,0 +1,27 @@
+CVE: CVE-2021-43618
+Upstream-Status: Backport
+Signed-off-by: Ross Burton <ross.burton@arm.com>
+
+# HG changeset patch
+# User Marco Bodrato <bodrato@mail.dm.unipi.it>
+# Date 1634836009 -7200
+# Node ID 561a9c25298e17bb01896801ff353546c6923dbd
+# Parent  e1fd9db13b475209a864577237ea4b9105b3e96e
+mpz/inp_raw.c: Avoid bit size overflows
+
+diff -r e1fd9db13b47 -r 561a9c25298e mpz/inp_raw.c
+--- a/mpz/inp_raw.c    Tue Dec 22 23:49:51 2020 +0100
++++ b/mpz/inp_raw.c    Thu Oct 21 19:06:49 2021 +0200
+@@ -88,8 +88,11 @@
+   abs_csize = ABS (csize);
++  if (UNLIKELY (abs_csize > ~(mp_bitcnt_t) 0 / 8))
++    return 0; /* Bit size overflows */
++
+   /* round up to a multiple of limbs */
+-  abs_xsize = BITS_TO_LIMBS (abs_csize*8);
++  abs_xsize = BITS_TO_LIMBS ((mp_bitcnt_t) abs_csize * 8);
+   if (abs_xsize != 0)
+     {
index d5996abd0024c58693157c61b1330a288a1516ec..e61582afdfda729e626af9b06c9a897d11aa0d70 100644 (file)
@@ -12,6 +12,7 @@ SRC_URI = "https://gmplib.org/download/${BPN}/${BP}${REVISION}.tar.bz2 \
            file://use-includedir.patch \
            file://0001-Append-the-user-provided-flags-to-the-auto-detected-.patch \
            file://0001-confiure.ac-Believe-the-cflags-from-environment.patch \
+           file://cve-2021-43618.patch \
            "
 SRC_URI[md5sum] = "28971fc21cf028042d4897f02fd355ea"
 SRC_URI[sha256sum] = "eae9326beb4158c386e39a356818031bd28f3124cf915f8c5b1dc4c7a36b4d7c"