On Wed, 2021-12-01 at 23:38 -0800, pgowda wrote:
> Backport the fix for CVE-2021-43396. It is disputed that this is a
> security issue.
> 
> (From OE-Core rev: e8de9b01c6b305b2498c5f942397a49ae2af0cde)
> 
> Signed-off-by: pgowda <[email protected]>
> ---
>  .../glibc/glibc/0031-CVE-2021-43396.patch     | 188
> ++++++++++++++++++
>  meta/recipes-core/glibc/glibc_2.33.bb         |   1 +
>  2 files changed, 189 insertions(+)
>  create mode 100644 meta/recipes-core/glibc/glibc/0031-CVE-2021-
> 43396.patch

This doesn't apply cleanly:

WARNING: glibc-2.33-r0 do_patch: Fuzz detected:

Applying patch 0031-CVE-2021-43396.patch
patching file iconvdata/Makefile
Hunk #3 succeeded at 325 with fuzz 2 (offset -3 lines).
patching file iconvdata/bug-iconv15.c
patching file iconvdata/iso-2022-jp-3.c
Hunk #1 succeeded at 1 with fuzz 2.
Hunk #2 succeeded at 82 (offset 2 lines).


The context lines in the patches can be updated with devtool:

    devtool modify glibc
    devtool finish --force-patch-refresh glibc <layer_path>

Don't forget to review changes done by devtool!

Thanks,

Anuj

> 
> diff --git a/meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch
> b/meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch
> new file mode 100644
> index 0000000000..179b0c559d
> --- /dev/null
> +++ b/meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch
> @@ -0,0 +1,188 @@
> +From ff012870b2c02a62598c04daa1e54632e020fd7d Mon Sep 17 00:00:00
> 2001
> +From: Nikita Popov <[email protected]>
> +Date: Tue, 2 Nov 2021 13:21:42 +0500
> +Subject: [PATCH] gconv: Do not emit spurious NUL character in ISO-
> 2022-JP-3
> + (bug 28524)
> +
> +Bugfix 27256 has introduced another issue:
> +In conversion from ISO-2022-JP-3 encoding, it is possible
> +to force iconv to emit extra NUL character on internal state reset.
> +To do this, it is sufficient to feed iconv with escape sequence
> +which switches active character set.
> +The simplified check 'data->__statep->__count != ASCII_set'
> +introduced by the aforementioned bugfix picks that case and
> +behaves as if '\0' character has been queued thus emitting it.
> +
> +To eliminate this issue, these steps are taken:
> +* Restore original condition
> +'(data->__statep->__count & ~7) != ASCII_set'.
> +It is necessary since bits 0-2 may contain
> +number of buffered input characters.
> +* Check that queued character is not NUL.
> +Similar step is taken for main conversion loop.
> +
> +Bundled test case follows following logic:
> +* Try to convert ISO-2022-JP-3 escape sequence
> +switching active character set
> +* Reset internal state by providing NULL as input buffer
> +* Ensure that nothing has been converted.
> +
> +Signed-off-by: Nikita Popov <[email protected]>
> +
> +CVE: CVE-2021-43396
> +Upstream-Status: Backport [ff012870b2c02a62598c04daa1e54632e020fd7d]
> +---
> + iconvdata/Makefile        |  5 +++-
> + iconvdata/bug-iconv15.c   | 60
> +++++++++++++++++++++++++++++++++++++++
> + iconvdata/iso-2022-jp-3.c | 28 ++++++++++++------
> + 3 files changed, 84 insertions(+), 9 deletions(-)
> + create mode 100644 iconvdata/bug-iconv15.c
> +
> +diff --git a/iconvdata/Makefile b/iconvdata/Makefile
> +index c216f959df..d5507a048c 100644
> +--- a/iconvdata/Makefile
> ++++ b/iconvdata/Makefile
> +@@ -1,4 +1,5 @@
> + # Copyright (C) 1997-2021 Free Software Foundation, Inc.
> ++# Copyright (C) The GNU Toolchain Authors.
> + # This file is part of the GNU C Library.
> + 
> + # The GNU C Library is free software; you can redistribute it
> and/or
> +@@ -74,7 +75,7 @@ ifeq (yes,$(build-shared))
> + tests = bug-iconv1 bug-iconv2 tst-loading tst-e2big tst-iconv4 bug-
> iconv4 \
> +       tst-iconv6 bug-iconv5 bug-iconv6 tst-iconv7 bug-iconv8 bug-
> iconv9 \
> +       bug-iconv10 bug-iconv11 bug-iconv12 tst-iconv-big5-hkscs-to-
> 2ucs4 \
> +-      bug-iconv13 bug-iconv14
> ++      bug-iconv13 bug-iconv14 bug-iconv15
> + ifeq ($(have-thread-library),yes)
> + tests += bug-iconv3
> + endif
> +@@ -327,6 +328,8 @@ $(objpfx)bug-iconv12.out: $(addprefix $(objpfx),
> $(gconv-modules)) \
> +                         $(addprefix $(objpfx),$(modules.so))
> + $(objpfx)bug-iconv14.out: $(addprefix $(objpfx), $(gconv-modules))
> \
> +                         $(addprefix $(objpfx),$(modules.so))
> ++$(objpfx)bug-iconv15.out: $(addprefix $(objpfx), $(gconv-modules))
> \
> ++                        $(addprefix $(objpfx),$(modules.so))
> + 
> + $(objpfx)iconv-test.out: run-iconv-test.sh \
> +                        $(addprefix $(objpfx), $(gconv-modules)) \
> +diff --git a/iconvdata/bug-iconv15.c b/iconvdata/bug-iconv15.c
> +new file mode 100644
> +index 0000000000..cc04bd0313
> +--- /dev/null
> ++++ b/iconvdata/bug-iconv15.c
> +@@ -0,0 +1,60 @@
> ++/* Bug 28524: Conversion from ISO-2022-JP-3 with iconv
> ++   may emit spurious NUL character on state reset.
> ++   Copyright (C) The GNU Toolchain Authors.
> ++   This file is part of the GNU C Library.
> ++
> ++   The GNU C Library is free software; you can redistribute it
> and/or
> ++   modify it under the terms of the GNU Lesser General Public
> ++   License as published by the Free Software Foundation; either
> ++   version 2.1 of the License, or (at your option) any later
> version.
> ++
> ++   The GNU C Library is distributed in the hope that it will be
> useful,
> ++   but WITHOUT ANY WARRANTY; without even the implied warranty of
> ++   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> GNU
> ++   Lesser General Public License for more details.
> ++
> ++   You should have received a copy of the GNU Lesser General Public
> ++   License along with the GNU C Library; if not, see
> ++   <https://www.gnu.org/licenses/>.  */
> ++
> ++#include <stddef.h>
> ++#include <iconv.h>
> ++#include <support/check.h>
> ++
> ++static int
> ++do_test (void)
> ++{
> ++  char in[] = "\x1b(I";
> ++  char *inbuf = in;
> ++  size_t inleft = sizeof (in) - 1;
> ++  char out[1];
> ++  char *outbuf = out;
> ++  size_t outleft = sizeof (out);
> ++  iconv_t cd;
> ++
> ++  cd = iconv_open ("UTF8", "ISO-2022-JP-3");
> ++  TEST_VERIFY_EXIT (cd != (iconv_t) -1);
> ++
> ++  /* First call to iconv should alter internal state.
> ++     Now, JISX0201_Kana_set is selected and
> ++     state value != ASCII_set.  */
> ++  TEST_VERIFY (iconv (cd, &inbuf, &inleft, &outbuf, &outleft) !=
> (size_t) -1);
> ++
> ++  /* No bytes should have been added to
> ++     the output buffer at this point.  */
> ++  TEST_VERIFY (outbuf == out);
> ++  TEST_VERIFY (outleft == sizeof (out));
> ++
> ++  /* Second call shall emit spurious NUL character in unpatched
> glibc.  */
> ++  TEST_VERIFY (iconv (cd, NULL, NULL, &outbuf, &outleft) !=
> (size_t) -1);
> ++
> ++  /* No characters are expected to be produced.  */
> ++  TEST_VERIFY (outbuf == out);
> ++  TEST_VERIFY (outleft == sizeof (out));
> ++
> ++  TEST_VERIFY_EXIT (iconv_close (cd) != -1);
> ++
> ++  return 0;
> ++}
> ++
> ++#include <support/test-driver.c>
> +diff --git a/iconvdata/iso-2022-jp-3.c b/iconvdata/iso-2022-jp-3.c
> +index 70b28ace7f..d724126545 100644
> +--- a/iconvdata/iso-2022-jp-3.c
> ++++ b/iconvdata/iso-2022-jp-3.c
> +@@ -1,5 +1,6 @@
> + /* Conversion module for ISO-2022-JP-3.
> +    Copyright (C) 1998-2021 Free Software Foundation, Inc.
> ++   Copyright (C) The GNU Toolchain Authors.
> +    This file is part of the GNU C Library.
> + 
> +    The GNU C Library is free software; you can redistribute it
> and/or
> +@@ -79,20 +80,31 @@ enum
> +    the output state to the initial state.  This has to be done
> during the
> +    flushing.  */
> + #define EMIT_SHIFT_TO_INIT \
> +-  if (data->__statep->__count != ASCII_set)                        
> \
> ++  if ((data->__statep->__count & ~7) !=
> ASCII_set)                          \
> +    
> {                                                                    
>    \
> +       if
> (FROM_DIRECTION)                                                   \
> +       {                                                            
>          \
> +-        if (__glibc_likely (outbuf + 4 <=
> outend))                          \
> ++        uint32_t ch = data->__statep->__count >>
> 6;                         \
> ++                                                                   
>          \
> ++        if (__glibc_unlikely (ch !=
> 0))                                     \
> +          
> {                                                                 \
> +-            /* Write out the last character. 
> */                            \
> +-            *((uint32_t *) outbuf) = data->__statep->__count >>
> 6;          \
> +-            outbuf += sizeof
> (uint32_t);                                    \
> +-            data->__statep->__count =
> ASCII_set;                      \
> ++            if (__glibc_likely (outbuf + 4 <=
> outend))                      \
> ++              {                                                    
>          \
> ++                /* Write out the last character. 
> */                        \
> ++                put32u (outbuf,
> ch);                                        \
> ++                outbuf +=
> 4;                                                \
> ++                data->__statep->__count &=
> 7;                               \
> ++                data->__statep->__count |=
> ASCII_set;                       \
> ++              }                                                    
>          \
> ++           
> else                                                            \
> ++              /* We don't have enough room in the output buffer. 
> */        \
> ++              status =
> __GCONV_FULL_OUTPUT;                                 \
> +          
> }                                                                 \
> +        
> else                                                                \
> +-          /* We don't have enough room in the output buffer. 
> */            \
> +-          status =
> __GCONV_FULL_OUTPUT;                                     \
> ++         
> {                                                                 \
> ++            data->__statep->__count &=
> 7;                                   \
> ++            data->__statep->__count |=
> ASCII_set;                           \
> ++         
> }                                                                 \
> +       }                                                            
>          \
> +      
> else                                                                 
> \
> +       {                                                            
>          \
> +-- 
> +2.27.0
> +
> diff --git a/meta/recipes-core/glibc/glibc_2.33.bb b/meta/recipes-
> core/glibc/glibc_2.33.bb
> index ad5e2b8eb1..38b8a8b065 100644
> --- a/meta/recipes-core/glibc/glibc_2.33.bb
> +++ b/meta/recipes-core/glibc/glibc_2.33.bb
> @@ -56,6 +56,7 @@ SRC_URI = 
> "${GLIBC_GIT_URI};branch=${SRCBRANCH};name=glibc \
>            
> file://0028-readlib-Add-OECORE_KNOWN_INTERPRETER_NAMES-to-known-.patch
>  \
>            
> file://0029-wordsize.h-Unify-the-header-between-arm-and-aarch64.patch
>  \
>            
> file://0030-powerpc-Do-not-ask-compiler-for-finding-arch.patch \
> +           file://0031-CVE-2021-43396.patch \
>             "
>  S = "${WORKDIR}/git"
>  B = "${WORKDIR}/build-${TARGET_SYS}"

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#160333): 
https://lists.openembedded.org/g/openembedded-core/message/160333
Mute This Topic: https://lists.openembedded.org/mt/87448329/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to