summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorVijay Anusuri <vanusuri@mvista.com>2023-06-26 10:46:53 +0530
committerArmin Kuster <akuster808@gmail.com>2023-07-14 07:08:54 -0400
commit00de17fa466b91de7bdbf8655929fb627aad18a8 (patch)
treebce4b2d87a72a2f8899a012545639fd5d679fa6f
parent6334241447e461f849035c47f071fa4a2125fee1 (diff)
downloadmeta-openembedded-00de17fa466b91de7bdbf8655929fb627aad18a8.tar.gz
libssh: CVE-2020-16135 NULL pointer dereference in sftpserver.c if ssh_buffer_new returns NULL
Upstream-Status: Backport [https://gitlab.com/libssh/libssh-mirror/-/commit/533d881b0f4b24c72b35ecc97fa35d295d063e53 & https://gitlab.com/libssh/libssh-mirror/-/commit/2782cb0495b7450bd8fe43ce4af886b66fea6c40 & https://gitlab.com/libssh/libssh-mirror/-/commit/10b3ebbe61a7031a3dae97f05834442220447181 & https://gitlab.com/libssh/libssh-mirror/-/commit/245ad744b5ab0582fef7cf3905a717b791d7e08b] Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta-oe/recipes-support/libssh/files/CVE-2020-16135-1.patch40
-rw-r--r--meta-oe/recipes-support/libssh/files/CVE-2020-16135-2.patch42
-rw-r--r--meta-oe/recipes-support/libssh/files/CVE-2020-16135-3.patch70
-rw-r--r--meta-oe/recipes-support/libssh/files/CVE-2020-16135-4.patch34
-rw-r--r--meta-oe/recipes-support/libssh/libssh_0.8.9.bb8
5 files changed, 193 insertions, 1 deletions
diff --git a/meta-oe/recipes-support/libssh/files/CVE-2020-16135-1.patch b/meta-oe/recipes-support/libssh/files/CVE-2020-16135-1.patch
new file mode 100644
index 0000000000..2944a44622
--- /dev/null
+++ b/meta-oe/recipes-support/libssh/files/CVE-2020-16135-1.patch
@@ -0,0 +1,40 @@
1From 533d881b0f4b24c72b35ecc97fa35d295d063e53 Mon Sep 17 00:00:00 2001
2From: Andreas Schneider <asn@cryptomilk.org>
3Date: Wed, 3 Jun 2020 10:04:09 +0200
4Subject: [PATCH] sftpserver: Add missing NULL check for ssh_buffer_new()
5
6Thanks to Ramin Farajpour Cami for spotting this.
7
8Fixes T232
9
10Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
11Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
12Reviewed-by: Jakub Jelen <jjelen@redhat.com>
13
14Upstream-Status: Backport [https://gitlab.com/libssh/libssh-mirror/-/commit/533d881b0f4b24c72b35ecc97fa35d295d063e53]
15CVE: CVE-2020-16135
16Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
17---
18 src/sftpserver.c | 6 ++++++
19 1 file changed, 6 insertions(+)
20
21diff --git a/src/sftpserver.c b/src/sftpserver.c
22index 5a2110e58..b639a2ce3 100644
23--- a/src/sftpserver.c
24+++ b/src/sftpserver.c
25@@ -67,6 +67,12 @@ sftp_client_message sftp_get_client_message(sftp_session sftp) {
26
27 /* take a copy of the whole packet */
28 msg->complete_message = ssh_buffer_new();
29+ if (msg->complete_message == NULL) {
30+ ssh_set_error_oom(session);
31+ sftp_client_message_free(msg);
32+ return NULL;
33+ }
34+
35 ssh_buffer_add_data(msg->complete_message,
36 ssh_buffer_get(payload),
37 ssh_buffer_get_len(payload));
38--
39GitLab
40
diff --git a/meta-oe/recipes-support/libssh/files/CVE-2020-16135-2.patch b/meta-oe/recipes-support/libssh/files/CVE-2020-16135-2.patch
new file mode 100644
index 0000000000..3c4ff0c614
--- /dev/null
+++ b/meta-oe/recipes-support/libssh/files/CVE-2020-16135-2.patch
@@ -0,0 +1,42 @@
1From 2782cb0495b7450bd8fe43ce4af886b66fea6c40 Mon Sep 17 00:00:00 2001
2From: Andreas Schneider <asn@cryptomilk.org>
3Date: Wed, 3 Jun 2020 10:05:51 +0200
4Subject: [PATCH] sftpserver: Add missing return check for
5 ssh_buffer_add_data()
6
7Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
8Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
9Reviewed-by: Jakub Jelen <jjelen@redhat.com>
10
11Upstream-Status: Backport [https://gitlab.com/libssh/libssh-mirror/-/commit/2782cb0495b7450bd8fe43ce4af886b66fea6c40]
12CVE: CVE-2020-16135
13Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
14---
15 src/sftpserver.c | 11 ++++++++---
16 1 file changed, 8 insertions(+), 3 deletions(-)
17
18diff --git a/src/sftpserver.c b/src/sftpserver.c
19index b639a2ce3..9117f155f 100644
20--- a/src/sftpserver.c
21+++ b/src/sftpserver.c
22@@ -73,9 +73,14 @@ sftp_client_message sftp_get_client_message(sftp_session sftp) {
23 return NULL;
24 }
25
26- ssh_buffer_add_data(msg->complete_message,
27- ssh_buffer_get(payload),
28- ssh_buffer_get_len(payload));
29+ rc = ssh_buffer_add_data(msg->complete_message,
30+ ssh_buffer_get(payload),
31+ ssh_buffer_get_len(payload));
32+ if (rc < 0) {
33+ ssh_set_error_oom(session);
34+ sftp_client_message_free(msg);
35+ return NULL;
36+ }
37
38 ssh_buffer_get_u32(payload, &msg->id);
39
40--
41GitLab
42
diff --git a/meta-oe/recipes-support/libssh/files/CVE-2020-16135-3.patch b/meta-oe/recipes-support/libssh/files/CVE-2020-16135-3.patch
new file mode 100644
index 0000000000..03a8ac156a
--- /dev/null
+++ b/meta-oe/recipes-support/libssh/files/CVE-2020-16135-3.patch
@@ -0,0 +1,70 @@
1From 10b3ebbe61a7031a3dae97f05834442220447181 Mon Sep 17 00:00:00 2001
2From: Andreas Schneider <asn@cryptomilk.org>
3Date: Wed, 3 Jun 2020 10:10:11 +0200
4Subject: [PATCH] buffer: Reformat ssh_buffer_add_data()
5
6Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
7Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
8Reviewed-by: Jakub Jelen <jjelen@redhat.com>
9
10Upstream-Status: Backport [https://gitlab.com/libssh/libssh-mirror/-/commit/10b3ebbe61a7031a3dae97f05834442220447181]
11CVE: CVE-2020-16135
12Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
13---
14 src/buffer.c | 35 ++++++++++++++++++-----------------
15 1 file changed, 18 insertions(+), 17 deletions(-)
16
17diff --git a/src/buffer.c b/src/buffer.c
18index a2e6246af..476bc1358 100644
19--- a/src/buffer.c
20+++ b/src/buffer.c
21@@ -299,28 +299,29 @@ int ssh_buffer_reinit(struct ssh_buffer_struct *buffer)
22 */
23 int ssh_buffer_add_data(struct ssh_buffer_struct *buffer, const void *data, uint32_t len)
24 {
25- buffer_verify(buffer);
26+ buffer_verify(buffer);
27
28- if (data == NULL) {
29- return -1;
30- }
31+ if (data == NULL) {
32+ return -1;
33+ }
34
35- if (buffer->used + len < len) {
36- return -1;
37- }
38+ if (buffer->used + len < len) {
39+ return -1;
40+ }
41
42- if (buffer->allocated < (buffer->used + len)) {
43- if(buffer->pos > 0)
44- buffer_shift(buffer);
45- if (realloc_buffer(buffer, buffer->used + len) < 0) {
46- return -1;
47+ if (buffer->allocated < (buffer->used + len)) {
48+ if (buffer->pos > 0) {
49+ buffer_shift(buffer);
50+ }
51+ if (realloc_buffer(buffer, buffer->used + len) < 0) {
52+ return -1;
53+ }
54 }
55- }
56
57- memcpy(buffer->data+buffer->used, data, len);
58- buffer->used+=len;
59- buffer_verify(buffer);
60- return 0;
61+ memcpy(buffer->data + buffer->used, data, len);
62+ buffer->used += len;
63+ buffer_verify(buffer);
64+ return 0;
65 }
66
67 /**
68--
69GitLab
70
diff --git a/meta-oe/recipes-support/libssh/files/CVE-2020-16135-4.patch b/meta-oe/recipes-support/libssh/files/CVE-2020-16135-4.patch
new file mode 100644
index 0000000000..8e9a4c3f5c
--- /dev/null
+++ b/meta-oe/recipes-support/libssh/files/CVE-2020-16135-4.patch
@@ -0,0 +1,34 @@
1From 245ad744b5ab0582fef7cf3905a717b791d7e08b Mon Sep 17 00:00:00 2001
2From: Andreas Schneider <asn@cryptomilk.org>
3Date: Wed, 3 Jun 2020 10:11:21 +0200
4Subject: [PATCH] buffer: Add NULL check for 'buffer' argument
5
6Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
7Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
8Reviewed-by: Jakub Jelen <jjelen@redhat.com>
9
10Upstream-Status: Backport [https://gitlab.com/libssh/libssh-mirror/-/commit/245ad744b5ab0582fef7cf3905a717b791d7e08b]
11CVE: CVE-2020-16135
12Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
13---
14 src/buffer.c | 4 ++++
15 1 file changed, 4 insertions(+)
16
17diff --git a/src/buffer.c b/src/buffer.c
18index 476bc1358..ce12f491a 100644
19--- a/src/buffer.c
20+++ b/src/buffer.c
21@@ -299,6 +299,10 @@ int ssh_buffer_reinit(struct ssh_buffer_struct *buffer)
22 */
23 int ssh_buffer_add_data(struct ssh_buffer_struct *buffer, const void *data, uint32_t len)
24 {
25+ if (buffer == NULL) {
26+ return -1;
27+ }
28+
29 buffer_verify(buffer);
30
31 if (data == NULL) {
32--
33GitLab
34
diff --git a/meta-oe/recipes-support/libssh/libssh_0.8.9.bb b/meta-oe/recipes-support/libssh/libssh_0.8.9.bb
index 39ed8a8fbb..0fb07a0eb7 100644
--- a/meta-oe/recipes-support/libssh/libssh_0.8.9.bb
+++ b/meta-oe/recipes-support/libssh/libssh_0.8.9.bb
@@ -6,7 +6,13 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=dabb4958b830e5df11d2b0ed8ea255a0"
6 6
7DEPENDS = "zlib openssl libgcrypt" 7DEPENDS = "zlib openssl libgcrypt"
8 8
9SRC_URI = "git://git.libssh.org/projects/libssh.git;branch=stable-0.8" 9SRC_URI = "git://git.libssh.org/projects/libssh.git;branch=stable-0.8 \
10 file://CVE-2020-16135-1.patch \
11 file://CVE-2020-16135-2.patch \
12 file://CVE-2020-16135-3.patch \
13 file://CVE-2020-16135-4.patch \
14 "
15
10SRCREV = "04685a74df9ce1db1bc116a83a0da78b4f4fa1f8" 16SRCREV = "04685a74df9ce1db1bc116a83a0da78b4f4fa1f8"
11 17
12S = "${WORKDIR}/git" 18S = "${WORKDIR}/git"