[OE-core] [zeus][PATCH 1/2] libxml2: fix CVE-2020-7595
akuster808
akuster808 at gmail.com
Sat Feb 22 18:50:13 UTC 2020
On 2/21/20 1:00 PM, Adrian Bunk wrote:
> From: Anuj Mittal <anuj.mittal at intel.com>
>
> Signed-off-by: Anuj Mittal <anuj.mittal at intel.com>
> Signed-off-by: Richard Purdie <richard.purdie at linuxfoundation.org>
> Signed-off-by: Adrian Bunk <bunk at stusta.de>
Is this a backport from Master? please include masters commit id.
Since Master and Zeus are at different versions, was there anything you
had to do to make this apply to Zeus?
I have adopted the kernel stable note of [Fixup for XXX context] so the
folks know things had to be tweaked from the original commit.
- Armin
> ---
> .../libxml/libxml2/CVE-2020-7595.patch | 36 +++++++++++++++++++
> meta/recipes-core/libxml/libxml2_2.9.9.bb | 1 +
> 2 files changed, 37 insertions(+)
> create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2020-7595.patch
>
> diff --git a/meta/recipes-core/libxml/libxml2/CVE-2020-7595.patch b/meta/recipes-core/libxml/libxml2/CVE-2020-7595.patch
> new file mode 100644
> index 0000000000..facfefd362
> --- /dev/null
> +++ b/meta/recipes-core/libxml/libxml2/CVE-2020-7595.patch
> @@ -0,0 +1,36 @@
> +From 0e1a49c8907645d2e155f0d89d4d9895ac5112b5 Mon Sep 17 00:00:00 2001
> +From: Zhipeng Xie <xiezhipeng1 at huawei.com>
> +Date: Thu, 12 Dec 2019 17:30:55 +0800
> +Subject: [PATCH] Fix infinite loop in xmlStringLenDecodeEntities
> +
> +When ctxt->instate == XML_PARSER_EOF,xmlParseStringEntityRef
> +return NULL which cause a infinite loop in xmlStringLenDecodeEntities
> +
> +Found with libFuzzer.
> +
> +Signed-off-by: Zhipeng Xie <xiezhipeng1 at huawei.com>
> +
> +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076]
> +CVE: CVE-2020-7595
> +Signed-off-by: Anuj Mittal <anuj.mittal at intel.com>
> +---
> + parser.c | 3 ++-
> + 1 file changed, 2 insertions(+), 1 deletion(-)
> +
> +diff --git a/parser.c b/parser.c
> +index d1c31963..a34bb6cd 100644
> +--- a/parser.c
> ++++ b/parser.c
> +@@ -2646,7 +2646,8 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len,
> + else
> + c = 0;
> + while ((c != 0) && (c != end) && /* non input consuming loop */
> +- (c != end2) && (c != end3)) {
> ++ (c != end2) && (c != end3) &&
> ++ (ctxt->instate != XML_PARSER_EOF)) {
> +
> + if (c == 0) break;
> + if ((c == '&') && (str[1] == '#')) {
> +--
> +2.24.1
> +
> diff --git a/meta/recipes-core/libxml/libxml2_2.9.9.bb b/meta/recipes-core/libxml/libxml2_2.9.9.bb
> index c44a90b1c2..5797dd6bee 100644
> --- a/meta/recipes-core/libxml/libxml2_2.9.9.bb
> +++ b/meta/recipes-core/libxml/libxml2_2.9.9.bb
> @@ -21,6 +21,7 @@ SRC_URI = "http://www.xmlsoft.org/sources/libxml2-${PV}.tar.gz;name=libtar \
> file://0001-Make-ptest-run-the-python-tests-if-python-is-enabled.patch \
> file://fix-execution-of-ptests.patch \
> file://Fix-CVE-2019-19956.patch \
> + file://CVE-2020-7595.patch \
> "
>
> SRC_URI[libtar.md5sum] = "c04a5a0a042eaa157e8e8c9eabe76bd6"
More information about the Openembedded-core
mailing list