summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/busybox/busybox_1.27.2.bb
diff options
context:
space:
mode:
authorZhixiong Chi <zhixiong.chi@windriver.com>2017-12-04 00:17:25 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-12-10 22:41:42 +0000
commitaa41f0c37460a2863ce26d1321c19c9bedf680c4 (patch)
tree1662a3889faed5807e2b11d1b4fdc9156f9d8644 /meta/recipes-core/busybox/busybox_1.27.2.bb
parentecad98a0ffe41d8cc8890d16be09e4b604a1e192 (diff)
downloadopenembedded-core-contrib-aa41f0c37460a2863ce26d1321c19c9bedf680c4.tar.gz
openembedded-core-contrib-aa41f0c37460a2863ce26d1321c19c9bedf680c4.tar.bz2
openembedded-core-contrib-aa41f0c37460a2863ce26d1321c19c9bedf680c4.zip
busybox: CVE-2017-16544
In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks. Backport the patch from: https://git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8 https://nvd.nist.gov/vuln/detail/CVE-2017-16544 Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta/recipes-core/busybox/busybox_1.27.2.bb')
-rw-r--r--meta/recipes-core/busybox/busybox_1.27.2.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-core/busybox/busybox_1.27.2.bb b/meta/recipes-core/busybox/busybox_1.27.2.bb
index 575127ec42..6c1f4888cf 100644
--- a/meta/recipes-core/busybox/busybox_1.27.2.bb
+++ b/meta/recipes-core/busybox/busybox_1.27.2.bb
@@ -43,6 +43,7 @@ SRC_URI = "http://www.busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \
file://runlevel \
file://makefile-libbb-race.patch \
file://CVE-2011-5325.patch \
+ file://busybox-CVE-2017-16544.patch \
"
SRC_URI_append_libc-musl = " file://musl.cfg "