diff options
author | Ralph Siemsen <ralph.siemsen@linaro.org> | 2022-04-06 14:17:39 -0400 |
---|---|---|
committer | Armin Kuster <akuster808@gmail.com> | 2022-04-18 07:37:42 -0700 |
commit | aa316ee2bbf631698369bf174cea259f18416a11 (patch) | |
tree | 1e05bb95fcf72b709d82cd7c80c6f0a76772d7bc | |
parent | 5cdde2991e72ba89fd22d9dabb8f5151964d0098 (diff) | |
download | meta-openembedded-aa316ee2bbf631698369bf174cea259f18416a11.tar.gz |
polkit: fix overlapping changes in recent CVE patches
Commit 17e931e77 ("polkit: fix CVE-2021-3560") contains
- upstream commit a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81
Commit 67ec3e049 ("polkit: Fix for CVE-2021-4115") contains both:
- upstream commit a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81 (CVE-2021-3560)
- upstream commit 41cb093f554da8772362654a128a84dd8a5542a7 (CVE-2021-4115)
Thus the fix for CVE-2021-3560 is applied twice, resulting in warnings
during do_patch. Curiously it neither fails nor complains about patch
already applied. Also devtool silently discards the duplicate patch.
Drop the duplicate patch, to resolve following warnings:
WARNING: polkit-0.116-r0 do_patch: Fuzz detected:
Applying patch 0001-GHSL-2021-074-authentication-bypass-vulnerability-in.patch
patching file src/polkit/polkitsystembusname.c
Hunk #1 succeeded at 438 with fuzz 2 (offset 3 lines).
Applying patch CVE-2021-4115.patch
patching file src/polkit/polkitsystembusname.c
Hunk #4 succeeded at 439 with fuzz 2.
Signed-off-by: Ralph Siemsen <ralph.siemsen@linaro.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r-- | meta-oe/recipes-extended/polkit/files/0001-GHSL-2021-074-authentication-bypass-vulnerability-in.patch | 32 | ||||
-rw-r--r-- | meta-oe/recipes-extended/polkit/polkit_0.116.bb | 1 |
2 files changed, 0 insertions, 33 deletions
diff --git a/meta-oe/recipes-extended/polkit/files/0001-GHSL-2021-074-authentication-bypass-vulnerability-in.patch b/meta-oe/recipes-extended/polkit/files/0001-GHSL-2021-074-authentication-bypass-vulnerability-in.patch deleted file mode 100644 index 2a2373ed5a..0000000000 --- a/meta-oe/recipes-extended/polkit/files/0001-GHSL-2021-074-authentication-bypass-vulnerability-in.patch +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | From a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81 Mon Sep 17 00:00:00 2001 | ||
2 | From: Jan Rybar <jrybar@redhat.com> | ||
3 | Date: Wed, 2 Jun 2021 15:43:38 +0200 | ||
4 | Subject: [PATCH] GHSL-2021-074: authentication bypass vulnerability in polkit | ||
5 | |||
6 | initial values returned if error caught | ||
7 | |||
8 | Upstream-Status: Backport [https://gitlab.freedesktop.org/polkit/polkit/-/commit/a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81.patch] | ||
9 | CVE: CVE-2021-4115 | ||
10 | Signed-off-by: Ranjitsinh Rathod <ranjitsinh.rathod@kpit.com> | ||
11 | |||
12 | --- | ||
13 | src/polkit/polkitsystembusname.c | 3 +++ | ||
14 | 1 file changed, 3 insertions(+) | ||
15 | |||
16 | diff --git a/src/polkit/polkitsystembusname.c b/src/polkit/polkitsystembusname.c | ||
17 | index 8daa12c..8ed1363 100644 | ||
18 | --- a/src/polkit/polkitsystembusname.c | ||
19 | +++ b/src/polkit/polkitsystembusname.c | ||
20 | @@ -435,6 +435,9 @@ polkit_system_bus_name_get_creds_sync (PolkitSystemBusName *system_bus | ||
21 | while (!((data.retrieved_uid && data.retrieved_pid) || data.caught_error)) | ||
22 | g_main_context_iteration (tmp_context, TRUE); | ||
23 | |||
24 | + if (data.caught_error) | ||
25 | + goto out; | ||
26 | + | ||
27 | if (out_uid) | ||
28 | *out_uid = data.uid; | ||
29 | if (out_pid) | ||
30 | -- | ||
31 | GitLab | ||
32 | |||
diff --git a/meta-oe/recipes-extended/polkit/polkit_0.116.bb b/meta-oe/recipes-extended/polkit/polkit_0.116.bb index ac48cf6c26..dd8e208616 100644 --- a/meta-oe/recipes-extended/polkit/polkit_0.116.bb +++ b/meta-oe/recipes-extended/polkit/polkit_0.116.bb | |||
@@ -27,7 +27,6 @@ SRC_URI = "http://www.freedesktop.org/software/polkit/releases/polkit-${PV}.tar. | |||
27 | file://0003-make-netgroup-support-optional.patch \ | 27 | file://0003-make-netgroup-support-optional.patch \ |
28 | file://CVE-2021-3560.patch \ | 28 | file://CVE-2021-3560.patch \ |
29 | file://CVE-2021-4034.patch \ | 29 | file://CVE-2021-4034.patch \ |
30 | file://0001-GHSL-2021-074-authentication-bypass-vulnerability-in.patch \ | ||
31 | file://CVE-2021-4115.patch \ | 30 | file://CVE-2021-4115.patch \ |
32 | " | 31 | " |
33 | SRC_URI[md5sum] = "4b37258583393e83069a0e2e89c0162a" | 32 | SRC_URI[md5sum] = "4b37258583393e83069a0e2e89c0162a" |