summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/busybox/busybox/BUG9071_buffer_overflow_arp.patch
diff options
context:
space:
mode:
authorAndrej Valek <andrej.valek@siemens.com>2017-10-03 17:38:52 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-11-05 13:44:54 +0000
commit55740077a1f3bed5956fe02ef17ba1d99176ea24 (patch)
tree3afb442bdb1bf343fb393b521d40eff02d26108b /meta/recipes-core/busybox/busybox/BUG9071_buffer_overflow_arp.patch
parenta0d2427bb86668215d7c9e1be07cb9a2d86f6755 (diff)
downloadopenembedded-core-55740077a1f3bed5956fe02ef17ba1d99176ea24.tar.gz
busybox: 1.24.1 -> 1.27.2
- fixed link creation to shell - reported bug with suid shells [https://bugs.busybox.net/show_bug.cgi?id=10346] - removed and modified already merged patches - updated defconfig regarding to new version Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Radovan Scasny <radovan.scasny@siemens.com> Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta/recipes-core/busybox/busybox/BUG9071_buffer_overflow_arp.patch')
-rw-r--r--meta/recipes-core/busybox/busybox/BUG9071_buffer_overflow_arp.patch53
1 files changed, 0 insertions, 53 deletions
diff --git a/meta/recipes-core/busybox/busybox/BUG9071_buffer_overflow_arp.patch b/meta/recipes-core/busybox/busybox/BUG9071_buffer_overflow_arp.patch
deleted file mode 100644
index 828694cbb9..0000000000
--- a/meta/recipes-core/busybox/busybox/BUG9071_buffer_overflow_arp.patch
+++ /dev/null
@@ -1,53 +0,0 @@
-busybox1.24.1: Fix busybox - (local) cmdline stack buffer overwrite
-
-[No upstream tracking] -- https://bugs.busybox.net/show_bug.cgi?id=9071
-
-busybox - (local) cmdline stack buffer overwrite
-
-Busybox provides an `arp` applet which is missing an array bounds check for
-command-line parameter `IFNAME`. It is therefore vulnerable to a command-line
-based local stack buffer overwrite effectively allowing local users to write
-past a 16 bytes fixed stack buffer. This leads to two scenarios, one (A) where
-an IOCTL for GET_HW_ADDRESS (`SIOCGIFHWADDR`) fails and results in a corrupted
-`va_list` being passed to `*printf()` and one (B) where an attacker might provide
-valid params for the IOCTL and trick the program to proceed and result in a
-`RET eip overwrite` eventually gaining code execution.
-
-Upstream-Status: Backport [https://git.busybox.net/busybox/commit/networking/arp.c?id=88e2b1cb626761b1924305b761a5dfc723613c4e]
-BUG: BUG9071
-Signed-off-by: Martin Balik <martin.balik@siemens.com>
-Signed-off-by: Pascal Bach <pascal.bach@siemens.com>
-
---
-
-diff --git a/networking/arp.c b/networking/arp.c
-index 0099aa5..87eb327 100644
---- a/networking/arp.c
-+++ b/networking/arp.c
-@@ -176,7 +176,7 @@ static int arp_del(char **args)
- if (flags == 0)
- flags = 3;
-
-- strncpy(req.arp_dev, device, sizeof(req.arp_dev));
-+ strncpy_IFNAMSIZ(req.arp_dev, device);
-
- err = -1;
-
-@@ -217,7 +217,7 @@ static void arp_getdevhw(char *ifname, struct sockaddr *sa)
- struct ifreq ifr;
- const struct hwtype *xhw;
-
-- strcpy(ifr.ifr_name, ifname);
-+ strncpy_IFNAMSIZ(ifr.ifr_name, ifname);
- ioctl_or_perror_and_die(sockfd, SIOCGIFHWADDR, &ifr,
- "can't get HW-Address for '%s'", ifname);
- if (hw_set && (ifr.ifr_hwaddr.sa_family != hw->type)) {
-@@ -330,7 +330,7 @@ static int arp_set(char **args)
- /* Fill in the remainder of the request. */
- req.arp_flags = flags;
-
-- strncpy(req.arp_dev, device, sizeof(req.arp_dev));
-+ strncpy_IFNAMSIZ(req.arp_dev, device);
-
- /* Call the kernel. */
- if (option_mask32 & ARP_OPT_v)