diff options
author | Yue Tao <yue.tao@windriver.com> | 2013-12-05 17:52:18 -0600 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2013-12-10 11:36:24 +0000 |
commit | e7b2b84dece29d16b8f05daf962b69e78dd64cb3 (patch) | |
tree | 5ef0554290a7ba6dd8d1c7e1e176c3f41d7a8938 /meta/recipes-bsp/acpid | |
parent | c6ccb09cee54a7b9d953f58fbb8849fd7d7de6a9 (diff) | |
download | openembedded-core-e7b2b84dece29d16b8f05daf962b69e78dd64cb3.tar.gz openembedded-core-e7b2b84dece29d16b8f05daf962b69e78dd64cb3.tar.bz2 openembedded-core-e7b2b84dece29d16b8f05daf962b69e78dd64cb3.zip |
acpid: CVE-2011-1159
acpid.c in acpid before 2.0.9 does not properly handle a situation in which
a process has connected to acpid.socket but is not reading any data, which
allows local users to cause a denial of service (daemon hang) via a crafted
application that performs a connect system call but no read system calls.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1159
Signed-off-by: Yue Tao <yue.tao@windriver.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Mark Hatle <mark.hatle@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-bsp/acpid')
-rw-r--r-- | meta/recipes-bsp/acpid/acpid.inc | 3 | ||||
-rw-r--r-- | meta/recipes-bsp/acpid/acpid/set_socket_noblock.patch | 10 |
2 files changed, 12 insertions, 1 deletions
diff --git a/meta/recipes-bsp/acpid/acpid.inc b/meta/recipes-bsp/acpid/acpid.inc index 40293c5ee4..a384265179 100644 --- a/meta/recipes-bsp/acpid/acpid.inc +++ b/meta/recipes-bsp/acpid/acpid.inc @@ -6,7 +6,8 @@ LICENSE="GPLv2+" SECTION = "base" SRC_URI = "${SOURCEFORGE_MIRROR}/acpid/acpid-${PV}.tar.gz \ - file://init" + file://init \ + file://set_socket_noblock.patch " inherit update-rc.d diff --git a/meta/recipes-bsp/acpid/acpid/set_socket_noblock.patch b/meta/recipes-bsp/acpid/acpid/set_socket_noblock.patch new file mode 100644 index 0000000000..54d64351d7 --- /dev/null +++ b/meta/recipes-bsp/acpid/acpid/set_socket_noblock.patch @@ -0,0 +1,10 @@ +--- a/acpid.c ++++ b/acpid.c +@@ -307,6 +307,7 @@ main(int argc, char **argv) + non_root_clients++; + } + fcntl(cli_fd, F_SETFD, FD_CLOEXEC); ++ fcntl(cli_fd, F_SETFL, O_NONBLOCK); + snprintf(buf, sizeof(buf)-1, "%d[%d:%d]", + creds.pid, creds.uid, creds.gid); + acpid_add_client(cli_fd, buf); |