On Wed, 2021-12-01 at 23:38 -0800, pgowda wrote:
> Backport the fix for CVE-2021-43396. It is disputed that this is a
> security issue.
>
> (From OE-Core rev: e8de9b01c6b305b2498c5f942397a49ae2af0cde)
>
> Signed-off-by: pgowda <[email protected]>
> ---
> .../glibc/glibc/0031-CVE-2021-43396.patch | 188
> ++++++++++++++++++
> meta/recipes-core/glibc/glibc_2.33.bb | 1 +
> 2 files changed, 189 insertions(+)
> create mode 100644 meta/recipes-core/glibc/glibc/0031-CVE-2021-
> 43396.patch
This doesn't apply cleanly:
WARNING: glibc-2.33-r0 do_patch: Fuzz detected:
Applying patch 0031-CVE-2021-43396.patch
patching file iconvdata/Makefile
Hunk #3 succeeded at 325 with fuzz 2 (offset -3 lines).
patching file iconvdata/bug-iconv15.c
patching file iconvdata/iso-2022-jp-3.c
Hunk #1 succeeded at 1 with fuzz 2.
Hunk #2 succeeded at 82 (offset 2 lines).
The context lines in the patches can be updated with devtool:
devtool modify glibc
devtool finish --force-patch-refresh glibc <layer_path>
Don't forget to review changes done by devtool!
Thanks,
Anuj
>
> diff --git a/meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch
> b/meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch
> new file mode 100644
> index 0000000000..179b0c559d
> --- /dev/null
> +++ b/meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch
> @@ -0,0 +1,188 @@
> +From ff012870b2c02a62598c04daa1e54632e020fd7d Mon Sep 17 00:00:00
> 2001
> +From: Nikita Popov <[email protected]>
> +Date: Tue, 2 Nov 2021 13:21:42 +0500
> +Subject: [PATCH] gconv: Do not emit spurious NUL character in ISO-
> 2022-JP-3
> + (bug 28524)
> +
> +Bugfix 27256 has introduced another issue:
> +In conversion from ISO-2022-JP-3 encoding, it is possible
> +to force iconv to emit extra NUL character on internal state reset.
> +To do this, it is sufficient to feed iconv with escape sequence
> +which switches active character set.
> +The simplified check 'data->__statep->__count != ASCII_set'
> +introduced by the aforementioned bugfix picks that case and
> +behaves as if '\0' character has been queued thus emitting it.
> +
> +To eliminate this issue, these steps are taken:
> +* Restore original condition
> +'(data->__statep->__count & ~7) != ASCII_set'.
> +It is necessary since bits 0-2 may contain
> +number of buffered input characters.
> +* Check that queued character is not NUL.
> +Similar step is taken for main conversion loop.
> +
> +Bundled test case follows following logic:
> +* Try to convert ISO-2022-JP-3 escape sequence
> +switching active character set
> +* Reset internal state by providing NULL as input buffer
> +* Ensure that nothing has been converted.
> +
> +Signed-off-by: Nikita Popov <[email protected]>
> +
> +CVE: CVE-2021-43396
> +Upstream-Status: Backport [ff012870b2c02a62598c04daa1e54632e020fd7d]
> +---
> + iconvdata/Makefile | 5 +++-
> + iconvdata/bug-iconv15.c | 60
> +++++++++++++++++++++++++++++++++++++++
> + iconvdata/iso-2022-jp-3.c | 28 ++++++++++++------
> + 3 files changed, 84 insertions(+), 9 deletions(-)
> + create mode 100644 iconvdata/bug-iconv15.c
> +
> +diff --git a/iconvdata/Makefile b/iconvdata/Makefile
> +index c216f959df..d5507a048c 100644
> +--- a/iconvdata/Makefile
> ++++ b/iconvdata/Makefile
> +@@ -1,4 +1,5 @@
> + # Copyright (C) 1997-2021 Free Software Foundation, Inc.
> ++# Copyright (C) The GNU Toolchain Authors.
> + # This file is part of the GNU C Library.
> +
> + # The GNU C Library is free software; you can redistribute it
> and/or
> +@@ -74,7 +75,7 @@ ifeq (yes,$(build-shared))
> + tests = bug-iconv1 bug-iconv2 tst-loading tst-e2big tst-iconv4 bug-
> iconv4 \
> + tst-iconv6 bug-iconv5 bug-iconv6 tst-iconv7 bug-iconv8 bug-
> iconv9 \
> + bug-iconv10 bug-iconv11 bug-iconv12 tst-iconv-big5-hkscs-to-
> 2ucs4 \
> +- bug-iconv13 bug-iconv14
> ++ bug-iconv13 bug-iconv14 bug-iconv15
> + ifeq ($(have-thread-library),yes)
> + tests += bug-iconv3
> + endif
> +@@ -327,6 +328,8 @@ $(objpfx)bug-iconv12.out: $(addprefix $(objpfx),
> $(gconv-modules)) \
> + $(addprefix $(objpfx),$(modules.so))
> + $(objpfx)bug-iconv14.out: $(addprefix $(objpfx), $(gconv-modules))
> \
> + $(addprefix $(objpfx),$(modules.so))
> ++$(objpfx)bug-iconv15.out: $(addprefix $(objpfx), $(gconv-modules))
> \
> ++ $(addprefix $(objpfx),$(modules.so))
> +
> + $(objpfx)iconv-test.out: run-iconv-test.sh \
> + $(addprefix $(objpfx), $(gconv-modules)) \
> +diff --git a/iconvdata/bug-iconv15.c b/iconvdata/bug-iconv15.c
> +new file mode 100644
> +index 0000000000..cc04bd0313
> +--- /dev/null
> ++++ b/iconvdata/bug-iconv15.c
> +@@ -0,0 +1,60 @@
> ++/* Bug 28524: Conversion from ISO-2022-JP-3 with iconv
> ++ may emit spurious NUL character on state reset.
> ++ Copyright (C) The GNU Toolchain Authors.
> ++ This file is part of the GNU C Library.
> ++
> ++ The GNU C Library is free software; you can redistribute it
> and/or
> ++ modify it under the terms of the GNU Lesser General Public
> ++ License as published by the Free Software Foundation; either
> ++ version 2.1 of the License, or (at your option) any later
> version.
> ++
> ++ The GNU C Library is distributed in the hope that it will be
> useful,
> ++ but WITHOUT ANY WARRANTY; without even the implied warranty of
> ++ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
> GNU
> ++ Lesser General Public License for more details.
> ++
> ++ You should have received a copy of the GNU Lesser General Public
> ++ License along with the GNU C Library; if not, see
> ++ <https://www.gnu.org/licenses/>. */
> ++
> ++#include <stddef.h>
> ++#include <iconv.h>
> ++#include <support/check.h>
> ++
> ++static int
> ++do_test (void)
> ++{
> ++ char in[] = "\x1b(I";
> ++ char *inbuf = in;
> ++ size_t inleft = sizeof (in) - 1;
> ++ char out[1];
> ++ char *outbuf = out;
> ++ size_t outleft = sizeof (out);
> ++ iconv_t cd;
> ++
> ++ cd = iconv_open ("UTF8", "ISO-2022-JP-3");
> ++ TEST_VERIFY_EXIT (cd != (iconv_t) -1);
> ++
> ++ /* First call to iconv should alter internal state.
> ++ Now, JISX0201_Kana_set is selected and
> ++ state value != ASCII_set. */
> ++ TEST_VERIFY (iconv (cd, &inbuf, &inleft, &outbuf, &outleft) !=
> (size_t) -1);
> ++
> ++ /* No bytes should have been added to
> ++ the output buffer at this point. */
> ++ TEST_VERIFY (outbuf == out);
> ++ TEST_VERIFY (outleft == sizeof (out));
> ++
> ++ /* Second call shall emit spurious NUL character in unpatched
> glibc. */
> ++ TEST_VERIFY (iconv (cd, NULL, NULL, &outbuf, &outleft) !=
> (size_t) -1);
> ++
> ++ /* No characters are expected to be produced. */
> ++ TEST_VERIFY (outbuf == out);
> ++ TEST_VERIFY (outleft == sizeof (out));
> ++
> ++ TEST_VERIFY_EXIT (iconv_close (cd) != -1);
> ++
> ++ return 0;
> ++}
> ++
> ++#include <support/test-driver.c>
> +diff --git a/iconvdata/iso-2022-jp-3.c b/iconvdata/iso-2022-jp-3.c
> +index 70b28ace7f..d724126545 100644
> +--- a/iconvdata/iso-2022-jp-3.c
> ++++ b/iconvdata/iso-2022-jp-3.c
> +@@ -1,5 +1,6 @@
> + /* Conversion module for ISO-2022-JP-3.
> + Copyright (C) 1998-2021 Free Software Foundation, Inc.
> ++ Copyright (C) The GNU Toolchain Authors.
> + This file is part of the GNU C Library.
> +
> + The GNU C Library is free software; you can redistribute it
> and/or
> +@@ -79,20 +80,31 @@ enum
> + the output state to the initial state. This has to be done
> during the
> + flushing. */
> + #define EMIT_SHIFT_TO_INIT \
> +- if (data->__statep->__count != ASCII_set)
> \
> ++ if ((data->__statep->__count & ~7) !=
> ASCII_set) \
> +
> {
> \
> + if
> (FROM_DIRECTION) \
> + {
> \
> +- if (__glibc_likely (outbuf + 4 <=
> outend)) \
> ++ uint32_t ch = data->__statep->__count >>
> 6; \
> ++
> \
> ++ if (__glibc_unlikely (ch !=
> 0)) \
> +
> { \
> +- /* Write out the last character.
> */ \
> +- *((uint32_t *) outbuf) = data->__statep->__count >>
> 6; \
> +- outbuf += sizeof
> (uint32_t); \
> +- data->__statep->__count =
> ASCII_set; \
> ++ if (__glibc_likely (outbuf + 4 <=
> outend)) \
> ++ {
> \
> ++ /* Write out the last character.
> */ \
> ++ put32u (outbuf,
> ch); \
> ++ outbuf +=
> 4; \
> ++ data->__statep->__count &=
> 7; \
> ++ data->__statep->__count |=
> ASCII_set; \
> ++ }
> \
> ++
> else \
> ++ /* We don't have enough room in the output buffer.
> */ \
> ++ status =
> __GCONV_FULL_OUTPUT; \
> +
> } \
> +
> else \
> +- /* We don't have enough room in the output buffer.
> */ \
> +- status =
> __GCONV_FULL_OUTPUT; \
> ++
> { \
> ++ data->__statep->__count &=
> 7; \
> ++ data->__statep->__count |=
> ASCII_set; \
> ++
> } \
> + }
> \
> +
> else
> \
> + {
> \
> +--
> +2.27.0
> +
> diff --git a/meta/recipes-core/glibc/glibc_2.33.bb b/meta/recipes-
> core/glibc/glibc_2.33.bb
> index ad5e2b8eb1..38b8a8b065 100644
> --- a/meta/recipes-core/glibc/glibc_2.33.bb
> +++ b/meta/recipes-core/glibc/glibc_2.33.bb
> @@ -56,6 +56,7 @@ SRC_URI =
> "${GLIBC_GIT_URI};branch=${SRCBRANCH};name=glibc \
>
> file://0028-readlib-Add-OECORE_KNOWN_INTERPRETER_NAMES-to-known-.patch
> \
>
> file://0029-wordsize.h-Unify-the-header-between-arm-and-aarch64.patch
> \
>
> file://0030-powerpc-Do-not-ask-compiler-for-finding-arch.patch \
> + file://0031-CVE-2021-43396.patch \
> "
> S = "${WORKDIR}/git"
> B = "${WORKDIR}/build-${TARGET_SYS}"
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#160333):
https://lists.openembedded.org/g/openembedded-core/message/160333
Mute This Topic: https://lists.openembedded.org/mt/87448329/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-