summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYue Tao <yue.tao@windriver.com>2013-12-05 17:52:18 -0600
committerRobert Yang <liezhi.yang@windriver.com>2014-01-26 14:08:15 +0800
commit56f1ea2cd8eeb189ee345f215deb5867a77cd0a1 (patch)
tree3ca254d0945063b04602858101d7a1f775200655
parent478b7f533c6664f1e4cab9950f257d927d32bb28 (diff)
downloadopenembedded-core-56f1ea2cd8eeb189ee345f215deb5867a77cd0a1.tar.gz
openembedded-core-56f1ea2cd8eeb189ee345f215deb5867a77cd0a1.tar.bz2
openembedded-core-56f1ea2cd8eeb189ee345f215deb5867a77cd0a1.zip
acpid: CVE-2011-1159
acpid.c in acpid before 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a crafted application that performs a connect system call but no read system calls. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1159 (From OE-Core master rev: e7b2b84dece29d16b8f05daf962b69e78dd64cb3) Signed-off-by: Yue Tao <yue.tao@windriver.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Mark Hatle <mark.hatle@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
-rw-r--r--meta/recipes-bsp/acpid/acpid.inc3
-rw-r--r--meta/recipes-bsp/acpid/acpid/set_socket_noblock.patch10
2 files changed, 12 insertions, 1 deletions
diff --git a/meta/recipes-bsp/acpid/acpid.inc b/meta/recipes-bsp/acpid/acpid.inc
index 40293c5ee4..a384265179 100644
--- a/meta/recipes-bsp/acpid/acpid.inc
+++ b/meta/recipes-bsp/acpid/acpid.inc
@@ -6,7 +6,8 @@ LICENSE="GPLv2+"
SECTION = "base"
SRC_URI = "${SOURCEFORGE_MIRROR}/acpid/acpid-${PV}.tar.gz \
- file://init"
+ file://init \
+ file://set_socket_noblock.patch "
inherit update-rc.d
diff --git a/meta/recipes-bsp/acpid/acpid/set_socket_noblock.patch b/meta/recipes-bsp/acpid/acpid/set_socket_noblock.patch
new file mode 100644
index 0000000000..54d64351d7
--- /dev/null
+++ b/meta/recipes-bsp/acpid/acpid/set_socket_noblock.patch
@@ -0,0 +1,10 @@
+--- a/acpid.c
++++ b/acpid.c
+@@ -307,6 +307,7 @@ main(int argc, char **argv)
+ non_root_clients++;
+ }
+ fcntl(cli_fd, F_SETFD, FD_CLOEXEC);
++ fcntl(cli_fd, F_SETFL, O_NONBLOCK);
+ snprintf(buf, sizeof(buf)-1, "%d[%d:%d]",
+ creds.pid, creds.uid, creds.gid);
+ acpid_add_client(cli_fd, buf);