diff options
author | Brad Bishop <bradleyb@fuzziesquirrel.com> | 2018-12-17 04:11:34 +0300 |
---|---|---|
committer | Brad Bishop <bradleyb@fuzziesquirrel.com> | 2019-01-09 02:21:44 +0300 |
commit | 1a4b7ee28bf7413af6513fb45ad0d0736048f866 (patch) | |
tree | 79f6d8ea698cab8f2eaf4f54b793d2ca7a1451ce /poky/meta/recipes-extended/procps | |
parent | 5b9ede0403237c7dace972affa65cf64a1aadd0e (diff) | |
download | openbmc-1a4b7ee28bf7413af6513fb45ad0d0736048f866.tar.xz |
reset upstream subtrees to yocto 2.6
Reset the following subtrees on thud HEAD:
poky: 87e3a9739d
meta-openembedded: 6094ae18c8
meta-security: 31dc4e7532
meta-raspberrypi: a48743dc36
meta-xilinx: c42016e2e6
Also re-apply backports that didn't make it into thud:
poky:
17726d0 systemd-systemctl-native: handle Install wildcards
meta-openembedded:
4321a5d libtinyxml2: update to 7.0.1
042f0a3 libcereal: Add native and nativesdk classes
e23284f libcereal: Allow empty package
030e8d4 rsyslog: curl-less build with fmhttp PACKAGECONFIG
179a1b9 gtest: update to 1.8.1
Squashed OpenBMC subtree compatibility updates:
meta-aspeed:
Brad Bishop (1):
aspeed: add yocto 2.6 compatibility
meta-ibm:
Brad Bishop (1):
ibm: prepare for yocto 2.6
meta-ingrasys:
Brad Bishop (1):
ingrasys: set layer compatibility to yocto 2.6
meta-openpower:
Brad Bishop (1):
openpower: set layer compatibility to yocto 2.6
meta-phosphor:
Brad Bishop (3):
phosphor: set layer compatibility to thud
phosphor: libgpg-error: drop patches
phosphor: react to fitimage artifact rename
Ed Tanous (4):
Dropbear: upgrade options for latest upgrade
yocto2.6: update openssl options
busybox: remove upstream watchdog patch
systemd: Rebase CONFIG_CGROUP_BPF patch
Change-Id: I7b1fe71cca880d0372a82d94b5fd785323e3a9e7
Signed-off-by: Brad Bishop <bradleyb@fuzziesquirrel.com>
Diffstat (limited to 'poky/meta/recipes-extended/procps')
-rw-r--r-- | poky/meta/recipes-extended/procps/procps/0001-Fix-out-of-tree-builds.patch | 24 | ||||
-rw-r--r-- | poky/meta/recipes-extended/procps/procps/CVE-2018-1124.patch | 176 | ||||
-rw-r--r-- | poky/meta/recipes-extended/procps/procps_3.3.15.bb (renamed from poky/meta/recipes-extended/procps/procps_3.3.12.bb) | 8 |
3 files changed, 28 insertions, 180 deletions
diff --git a/poky/meta/recipes-extended/procps/procps/0001-Fix-out-of-tree-builds.patch b/poky/meta/recipes-extended/procps/procps/0001-Fix-out-of-tree-builds.patch new file mode 100644 index 000000000..e54819436 --- /dev/null +++ b/poky/meta/recipes-extended/procps/procps/0001-Fix-out-of-tree-builds.patch @@ -0,0 +1,24 @@ +From 0825db94fc91fa2150c0e649e92cc8dcc44f4b38 Mon Sep 17 00:00:00 2001 +From: Alexander Kanavin <alex.kanavin@gmail.com> +Date: Wed, 4 Apr 2018 14:09:45 +0300 +Subject: [PATCH] Fix out of tree builds + +Upstream-Status: Pending +Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> +--- + include/nls.h | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/include/nls.h b/include/nls.h +index 1166b7b..f5abe05 100644 +--- a/include/nls.h ++++ b/include/nls.h +@@ -6,7 +6,7 @@ + #define PROCPS_NG_NLS_H + + /* programs issuing textdomain() need PACKAGE string */ +-#include "../config.h" ++#include "config.h" + + /* programs issuing bindtextdomain() also need LOCALEDIR string */ + #ifndef LOCALEDIR diff --git a/poky/meta/recipes-extended/procps/procps/CVE-2018-1124.patch b/poky/meta/recipes-extended/procps/procps/CVE-2018-1124.patch deleted file mode 100644 index bc78faf0d..000000000 --- a/poky/meta/recipes-extended/procps/procps/CVE-2018-1124.patch +++ /dev/null @@ -1,176 +0,0 @@ -From bdd058a0e676d2f013027fcfb2b344c313112a50 Mon Sep 17 00:00:00 2001 -From: Qualys Security Advisory <qsa@qualys.com> -Date: Thu, 1 Jan 1970 00:00:00 +0000 -Subject: [PATCH 074/126] proc/readproc.c: Fix bugs and overflows in - file2strvec(). - -Note: this is by far the most important and complex patch of the whole -series, please review it carefully; thank you very much! - -For this patch, we decided to keep the original function's design and -skeleton, to avoid regressions and behavior changes, while fixing the -various bugs and overflows. And like the "Harden file2str()" patch, this -patch does not fail when about to overflow, but truncates instead: there -is information available about this process, so return it to the caller; -also, we used INT_MAX as a limit, but a lower limit could be used. - -The easy changes: - -- Replace sprintf() with snprintf() (and check for truncation). - -- Replace "if (n == 0 && rbuf == 0)" with "if (n <= 0 && tot <= 0)" and - do break instead of return: it simplifies the code (only one place to - handle errors), and also guarantees that in the while loop either n or - tot is > 0 (or both), even if n is reset to 0 when about to overflow. - -- Remove the "if (n < 0)" block in the while loop: it is (and was) dead - code, since we enter the while loop only if n >= 0. - -- Rewrite the missing-null-terminator detection: in the original - function, if the size of the file is a multiple of 2047, a null- - terminator is appended even if the file is already null-terminated. - -- Replace "if (n <= 0 && !end_of_file)" with "if (n < 0 || tot <= 0)": - originally, it was equivalent to "if (n < 0)", but we added "tot <= 0" - to handle the first break of the while loop, and to guarantee that in - the rest of the function tot is > 0. - -- Double-force ("belt and suspenders") the null-termination of rbuf: - this is (and was) essential to the correctness of the function. - -- Replace the final "while" loop with a "for" loop that behaves just - like the preceding "for" loop: in the original function, this would - lead to unexpected results (for example, if rbuf is |\0|A|\0|, this - would return the array {"",NULL} but should return {"","A",NULL}; and - if rbuf is |A|\0|B| (should never happen because rbuf should be null- - terminated), this would make room for two pointers in ret, but would - write three pointers to ret). - -The hard changes: - -- Prevent the integer overflow of tot in the while loop, but unlike - file2str(), file2strvec() cannot let tot grow until it almost reaches - INT_MAX, because it needs more space for the pointers: this is why we - introduced ARG_LEN, which also guarantees that we can add "align" and - a few sizeof(char*)s to tot without overflowing. - -- Prevent the integer overflow of "tot + c + align": when INT_MAX is - (almost) reached, we write the maximal safe amount of pointers to ret - (ARG_LEN guarantees that there is always space for *ret = rbuf and the - NULL terminator). -[carnil: backport for 3.3.9: Add include for limits.h and use of MAX_INT] - -CVE: CVE-2018-1124 -Upstream-Status: Backport [https://gitlab.com/procps-ng/procps/commit/36c350f07c75aabf747fb833f52a234ae5781b20] - -Signed-off-by: Jagadeesh Krishnanjanappa <jkrishnanjanappa@mvista.com> ---- - proc/readproc.c | 53 ++++++++++++++++++++++++++++++++--------------------- - 1 file changed, 32 insertions(+), 21 deletions(-) - -diff -Naurp procps-ng-3.3.12_org/proc/readproc.c procps-ng-3.3.12/proc/readproc.c ---- procps-ng-3.3.12_org/proc/readproc.c 2016-07-09 14:49:25.825306872 -0700 -+++ procps-ng-3.3.12/proc/readproc.c 2018-07-24 00:46:49.366202531 -0700 -@@ -37,6 +37,7 @@ - #include <dirent.h> - #include <sys/types.h> - #include <sys/stat.h> -+#include <limits.h> - #ifdef WITH_SYSTEMD - #include <systemd/sd-login.h> - #endif ---- a/proc/readproc.c -+++ b/proc/readproc.c -@@ -600,11 +601,12 @@ static int file2str(const char *director - - static char** file2strvec(const char* directory, const char* what) { - char buf[2048]; /* read buf bytes at a time */ -- char *p, *rbuf = 0, *endbuf, **q, **ret; -+ char *p, *rbuf = 0, *endbuf, **q, **ret, *strp; - int fd, tot = 0, n, c, end_of_file = 0; - int align; - -- sprintf(buf, "%s/%s", directory, what); -+ const int len = snprintf(buf, sizeof buf, "%s/%s", directory, what); -+ if(len <= 0 || (size_t)len >= sizeof buf) return NULL; - fd = open(buf, O_RDONLY, 0); - if(fd==-1) return NULL; - -@@ -612,18 +614,23 @@ static char** file2strvec(const char* di - while ((n = read(fd, buf, sizeof buf - 1)) >= 0) { - if (n < (int)(sizeof buf - 1)) - end_of_file = 1; -- if (n == 0 && rbuf == 0) { -- close(fd); -- return NULL; /* process died between our open and read */ -+ if (n <= 0 && tot <= 0) { /* nothing read now, nothing read before */ -+ break; /* process died between our open and read */ - } -- if (n < 0) { -- if (rbuf) -- free(rbuf); -- close(fd); -- return NULL; /* read error */ -+ /* ARG_LEN is our guesstimated median length of a command-line argument -+ or environment variable (the minimum is 1, the maximum is 131072) */ -+ #define ARG_LEN 64 -+ if (tot >= INT_MAX / (ARG_LEN + (int)sizeof(char*)) * ARG_LEN - n) { -+ end_of_file = 1; /* integer overflow: null-terminate and break */ -+ n = 0; /* but tot > 0 */ - } -- if (end_of_file && (n == 0 || buf[n-1]))/* last read char not null */ -+ #undef ARG_LEN -+ if (end_of_file && -+ ((n > 0 && buf[n-1] != '\0') || /* last read char not null */ -+ (n <= 0 && rbuf[tot-1] != '\0'))) /* last read char not null */ - buf[n++] = '\0'; /* so append null-terminator */ -+ -+ if (n <= 0) break; /* unneeded (end_of_file = 1) but avoid realloc */ - rbuf = xrealloc(rbuf, tot + n); /* allocate more memory */ - memcpy(rbuf + tot, buf, n); /* copy buffer into it */ - tot += n; /* increment total byte ctr */ -@@ -631,29 +638,34 @@ static char** file2strvec(const char* di - break; - } - close(fd); -- if (n <= 0 && !end_of_file) { -+ if (n < 0 || tot <= 0) { /* error, or nothing read */ - if (rbuf) free(rbuf); - return NULL; /* read error */ - } -+ rbuf[tot-1] = '\0'; /* belt and suspenders (the while loop did it, too) */ - endbuf = rbuf + tot; /* count space for pointers */ - align = (sizeof(char*)-1) - ((tot + sizeof(char*)-1) & (sizeof(char*)-1)); -- for (c = 0, p = rbuf; p < endbuf; p++) { -- if (!*p || *p == '\n') -+ c = sizeof(char*); /* one extra for NULL term */ -+ for (p = rbuf; p < endbuf; p++) { -+ if (!*p || *p == '\n') { -+ if (c >= INT_MAX - (tot + (int)sizeof(char*) + align)) break; - c += sizeof(char*); -+ } - if (*p == '\n') - *p = 0; - } -- c += sizeof(char*); /* one extra for NULL term */ - - rbuf = xrealloc(rbuf, tot + c + align); /* make room for ptrs AT END */ - endbuf = rbuf + tot; /* addr just past data buf */ - q = ret = (char**) (endbuf+align); /* ==> free(*ret) to dealloc */ -- *q++ = p = rbuf; /* point ptrs to the strings */ -- endbuf--; /* do not traverse final NUL */ -- while (++p < endbuf) -- if (!*p) /* NUL char implies that */ -- *q++ = p+1; /* next string -> next char */ -- -+ for (strp = p = rbuf; p < endbuf; p++) { -+ if (!*p) { /* NUL char implies that */ -+ if (c < 2 * (int)sizeof(char*)) break; -+ c -= sizeof(char*); -+ *q++ = strp; /* point ptrs to the strings */ -+ strp = p+1; /* next string -> next char */ -+ } -+ } - *q = 0; /* null ptr list terminator */ - return ret; - } diff --git a/poky/meta/recipes-extended/procps/procps_3.3.12.bb b/poky/meta/recipes-extended/procps/procps_3.3.15.bb index 6e15b0a5a..9756db0e7 100644 --- a/poky/meta/recipes-extended/procps/procps_3.3.12.bb +++ b/poky/meta/recipes-extended/procps/procps_3.3.15.bb @@ -14,11 +14,11 @@ inherit autotools gettext pkgconfig update-alternatives SRC_URI = "http://downloads.sourceforge.net/project/procps-ng/Production/procps-ng-${PV}.tar.xz \ file://sysctl.conf \ - file://CVE-2018-1124.patch \ - " + file://0001-Fix-out-of-tree-builds.patch \ + " -SRC_URI[md5sum] = "957e42e8b193490b2111252e4a2b443c" -SRC_URI[sha256sum] = "6ed65ab86318f37904e8f9014415a098bec5bc53653e5d9ab404f95ca5e1a7d4" +SRC_URI[md5sum] = "2b0717a7cb474b3d6dfdeedfbad2eccc" +SRC_URI[sha256sum] = "10bd744ffcb3de2d591d2f6acf1a54a7ba070fdcc432a855931a5057149f0465" S = "${WORKDIR}/procps-ng-${PV}" |