diff options
| author | Andre McCurdy <armccurdy@gmail.com> | 2015-03-19 10:50:18 -0700 | 
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-03-21 09:42:12 +0000 | 
| commit | 680fc6e7c571f70cffa9799c21604e0719504591 (patch) | |
| tree | 6f8a42002ea02b4193dd8dd17c09411a42ca65c2 | |
| parent | e848484989307ae6826ba0f5217f7702322181e3 (diff) | |
| download | openembedded-core-680fc6e7c571f70cffa9799c21604e0719504591.tar.gz openembedded-core-680fc6e7c571f70cffa9799c21604e0719504591.tar.bz2 openembedded-core-680fc6e7c571f70cffa9799c21604e0719504591.zip | |
busybox: lzop: add overflow check (CVE-2014-4607)
Backport from busybox 1_22_stable branch:
  http://git.busybox.net/busybox/commit/?h=1_22_stable&id=5698ff93233b47218a677fd7facd8cc90211d1a4
Signed-off-by: Andre McCurdy <armccurdy@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
| -rw-r--r-- | meta/recipes-core/busybox/busybox/lzop-add-overflow-check.patch | 71 | ||||
| -rw-r--r-- | meta/recipes-core/busybox/busybox_1.22.1.bb | 1 | 
2 files changed, 72 insertions, 0 deletions
| diff --git a/meta/recipes-core/busybox/busybox/lzop-add-overflow-check.patch b/meta/recipes-core/busybox/busybox/lzop-add-overflow-check.patch new file mode 100644 index 0000000000..63d49481a3 --- /dev/null +++ b/meta/recipes-core/busybox/busybox/lzop-add-overflow-check.patch @@ -0,0 +1,71 @@ +Upstream-status: Backport +http://git.busybox.net/busybox/commit/?h=1_22_stable&id=5698ff93233b47218a677fd7facd8cc90211d1a4 + +From 5698ff93233b47218a677fd7facd8cc90211d1a4 Mon Sep 17 00:00:00 2001 +From: Denys Vlasenko <vda.linux@googlemail.com> +Date: Mon, 30 Jun 2014 10:14:34 +0200 +Subject: [PATCH] lzop: add overflow check + +See CVE-2014-4607 +http://www.openwall.com/lists/oss-security/2014/06/26/20 + +function                                             old     new   delta +lzo1x_decompress_safe                               1010    1031     +21 + +Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> +Signed-off-by: Mike Frysinger <vapier@gentoo.org> +(cherry picked from commit a9dc7c2f59dc5e92870d2d46316ea5c1f14740e3) +--- + archival/libarchive/liblzo.h  | 2 ++ + archival/libarchive/lzo1x_d.c | 3 +++ + 2 files changed, 5 insertions(+) + +diff --git a/archival/libarchive/liblzo.h b/archival/libarchive/liblzo.h +index 843997c..4596620 100644 +--- a/archival/libarchive/liblzo.h ++++ b/archival/libarchive/liblzo.h +@@ -76,11 +76,13 @@ + #    define TEST_IP             (ip < ip_end) + #    define NEED_IP(x) \ +             if ((unsigned)(ip_end - ip) < (unsigned)(x))  goto input_overrun ++#    define TEST_IV(x)          if ((x) > (unsigned)0 - (511)) goto input_overrun +  + #    undef TEST_OP              /* don't need both of the tests here */ + #    define TEST_OP             1 + #    define NEED_OP(x) \ +             if ((unsigned)(op_end - op) < (unsigned)(x))  goto output_overrun ++#    define TEST_OV(x)          if ((x) > (unsigned)0 - (511)) goto output_overrun +  + #define HAVE_ANY_OP 1 +  +diff --git a/archival/libarchive/lzo1x_d.c b/archival/libarchive/lzo1x_d.c +index 9bc1270..40b167e 100644 +--- a/archival/libarchive/lzo1x_d.c ++++ b/archival/libarchive/lzo1x_d.c +@@ -92,6 +92,7 @@ int lzo1x_decompress_safe(const uint8_t* in, unsigned in_len, + 				ip++; + 				NEED_IP(1); + 			} ++			TEST_IV(t); + 			t += 15 + *ip++; + 		} + 		/* copy literals */ +@@ -224,6 +225,7 @@ int lzo1x_decompress_safe(const uint8_t* in, unsigned in_len, + 						ip++; + 						NEED_IP(1); + 					} ++					TEST_IV(t); + 					t += 31 + *ip++; + 				} + #if defined(COPY_DICT) +@@ -265,6 +267,7 @@ int lzo1x_decompress_safe(const uint8_t* in, unsigned in_len, + 						ip++; + 						NEED_IP(1); + 					} ++					TEST_IV(t); + 					t += 7 + *ip++; + 				} + #if defined(COPY_DICT) +--  +1.9.1 + diff --git a/meta/recipes-core/busybox/busybox_1.22.1.bb b/meta/recipes-core/busybox/busybox_1.22.1.bb index 77365201b5..3934278328 100644 --- a/meta/recipes-core/busybox/busybox_1.22.1.bb +++ b/meta/recipes-core/busybox/busybox_1.22.1.bb @@ -33,6 +33,7 @@ SRC_URI = "http://www.busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \             file://recognize_connmand.patch \             file://busybox-cross-menuconfig.patch \             file://CVE-2014-9645_busybox_reject_module_names_with_slashes.patch \ +           file://lzop-add-overflow-check.patch \  "  SRC_URI[tarball.md5sum] = "337d1a15ab1cb1d4ed423168b1eb7d7e" | 
