mirror of
https://git.yoctoproject.org/poky
synced 2026-05-06 05:27:54 +02:00
glibc: Security Fix CVE-2017-17426
Affects glibc < 2.27 including current master hash 77f921dac17c5fa99bd9e926d926c327982895f7 (From OE-Core rev: a273d099c3bc73736579b7b6ead2572721f16d2a) Signed-off-by: Huang Qiyu <huangqy.fnst@cn.fujitsu.com> [v2] Rebased on new master [v3] Fix typo in patch status Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
b1dde7b031
commit
78bdc1b724
53
meta/recipes-core/glibc/glibc/CVE-2017-17426.patch
Normal file
53
meta/recipes-core/glibc/glibc/CVE-2017-17426.patch
Normal file
@@ -0,0 +1,53 @@
|
||||
From 34697694e8a93b325b18f25f7dcded55d6baeaf6 Mon Sep 17 00:00:00 2001
|
||||
From: Arjun Shankar <arjun@redhat.com>
|
||||
Date: Thu, 30 Nov 2017 13:31:45 +0100
|
||||
Subject: [PATCH] Fix integer overflow in malloc when tcache is enabled [BZ
|
||||
#22375]
|
||||
|
||||
When the per-thread cache is enabled, __libc_malloc uses request2size (which
|
||||
does not perform an overflow check) to calculate the chunk size from the
|
||||
requested allocation size. This leads to an integer overflow causing malloc
|
||||
to incorrectly return the last successfully allocated block when called with
|
||||
a very large size argument (close to SIZE_MAX).
|
||||
|
||||
This commit uses checked_request2size instead, removing the overflow.
|
||||
|
||||
Upstream-Status: Backport
|
||||
CVE: CVE-2017-17426
|
||||
Signed-off-by: Huang Qiyu <huangqy.fnst@cn.fujitsu.com>
|
||||
Rebase on new master
|
||||
Signed-off-by: Armin Kuster <akuster@mvista.com>
|
||||
|
||||
---
|
||||
ChangeLog | 6 ++++++
|
||||
malloc/malloc.c | 3 ++-
|
||||
2 files changed, 8 insertions(+), 1 deletion(-)
|
||||
|
||||
Index: git/malloc/malloc.c
|
||||
===================================================================
|
||||
--- git.orig/malloc/malloc.c
|
||||
+++ git/malloc/malloc.c
|
||||
@@ -3064,7 +3064,8 @@ __libc_malloc (size_t bytes)
|
||||
return (*hook)(bytes, RETURN_ADDRESS (0));
|
||||
#if USE_TCACHE
|
||||
/* int_free also calls request2size, be careful to not pad twice. */
|
||||
- size_t tbytes = request2size (bytes);
|
||||
+ size_t tbytes;
|
||||
+ checked_request2size (bytes, tbytes);
|
||||
size_t tc_idx = csize2tidx (tbytes);
|
||||
|
||||
MAYBE_INIT_TCACHE ();
|
||||
Index: git/ChangeLog
|
||||
===================================================================
|
||||
--- git.orig/ChangeLog
|
||||
+++ git/ChangeLog
|
||||
@@ -1,3 +1,9 @@
|
||||
+2017-11-30 Arjun Shankar <arjun@redhat.com>
|
||||
+
|
||||
+ [BZ #22375]
|
||||
+ * malloc/malloc.c (__libc_malloc): Use checked_request2size
|
||||
+ instead of request2size.
|
||||
+
|
||||
2017-12-30 Aurelien Jarno <aurelien@aurel32.net>
|
||||
Dmitry V. Levin <ldv@altlinux.org>
|
||||
|
||||
@@ -45,6 +45,7 @@ SRC_URI = "${GLIBC_GIT_URI};branch=${SRCBRANCH};name=glibc \
|
||||
file://0029-malloc-add-missing-arena-lock-in-malloc-info.patch \
|
||||
file://CVE-2017-15671.patch \
|
||||
file://CVE-2017-16997.patch \
|
||||
file://CVE-2017-17426.patch \
|
||||
"
|
||||
|
||||
NATIVESDKFIXES ?= ""
|
||||
|
||||
Reference in New Issue
Block a user