summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSiddharth Doshi <sdoshi@mvista.com>2024-06-13 20:17:01 +0530
committerArmin Kuster <akuster808@gmail.com>2024-06-17 09:08:35 -0400
commit366bac39bd996c34230daa0eaf1ac19fc3aa79b6 (patch)
treec55745746f115fe13542ff3179c114910be4f9e2
parentd35e1e52bfddf8435c99fdfa552e4af133193ce3 (diff)
downloadmeta-openembedded-366bac39bd996c34230daa0eaf1ac19fc3aa79b6.tar.gz
nano: Security fix for CVE-2024-5742
Upstream-Status: Backport from [https://git.savannah.gnu.org/cgit/nano.git/commit/?id=5e7a3c2e7e118c7f12d5dfda9f9140f638976aa2] CVE's Fixed: CVE-2024-5742 nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file Signed-off-by: Siddharth Doshi <sdoshi@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta-oe/recipes-support/nano/files/CVE-2024-5742.patch101
-rw-r--r--meta-oe/recipes-support/nano/nano_7.2.bb4
2 files changed, 104 insertions, 1 deletions
diff --git a/meta-oe/recipes-support/nano/files/CVE-2024-5742.patch b/meta-oe/recipes-support/nano/files/CVE-2024-5742.patch
new file mode 100644
index 0000000000..f29b73c539
--- /dev/null
+++ b/meta-oe/recipes-support/nano/files/CVE-2024-5742.patch
@@ -0,0 +1,101 @@
1From aad1439553de8ce0ef8815a65ac0732dc804507b Mon Sep 17 00:00:00 2001
2From: Benno Schulenberg <bensberg@telfort.nl>
3Date: Sun, 28 Apr 2024 10:51:52 +0200
4Subject: [PATCH] files: run `chmod` and `chown` on the descriptor, not on the
5 filename
6
7This closes a window of opportunity where the emergency file could be
8replaced by a malicious symlink.
9
10The issue was reported by `MartinJM` and `InvisibleMeerkat`.
11
12Problem existed since version 2.2.0, commit 123110c5, when chmodding
13and chowning of the emergency .save file was added.
14
15Upstream-Status: Backport from [https://git.savannah.gnu.org/cgit/nano.git/commit/?id=5e7a3c2e7e118c7f12d5dfda9f9140f638976aa2]
16CVE: CVE-2024-5742
17Signed-off-by: Siddharth Doshi <sdoshi@mvista.com>
18---
19 src/definitions.h | 2 +-
20 src/files.c | 13 ++++++++++++-
21 src/nano.c | 12 +-----------
22 3 files changed, 14 insertions(+), 13 deletions(-)
23
24diff --git a/src/definitions.h b/src/definitions.h
25index 288f1ff..04614a3 100644
26--- a/src/definitions.h
27+++ b/src/definitions.h
28@@ -283,7 +283,7 @@ typedef enum {
29 } message_type;
30
31 typedef enum {
32- OVERWRITE, APPEND, PREPEND
33+ OVERWRITE, APPEND, PREPEND, EMERGENCY
34 } kind_of_writing_type;
35
36 typedef enum {
37diff --git a/src/files.c b/src/files.c
38index c6eadc1..88397d3 100644
39--- a/src/files.c
40+++ b/src/files.c
41@@ -1760,6 +1760,8 @@ bool write_file(const char *name, FILE *thefile, bool normal,
42 #endif
43 char *realname = real_dir_from_tilde(name);
44 /* The filename after tilde expansion. */
45+ int fd = 0;
46+ /* The descriptor that is assigned when opening the file. */
47 char *tempname = NULL;
48 /* The name of the temporary file we use when prepending. */
49 linestruct *line = openfile->filetop;
50@@ -1843,7 +1845,6 @@ bool write_file(const char *name, FILE *thefile, bool normal,
51 * For an emergency file, access is restricted to just the owner. */
52 if (thefile == NULL) {
53 mode_t permissions = (normal ? RW_FOR_ALL : S_IRUSR|S_IWUSR);
54- int fd;
55
56 #ifndef NANO_TINY
57 block_sigwinch(TRUE);
58@@ -1969,6 +1970,16 @@ bool write_file(const char *name, FILE *thefile, bool normal,
59 }
60 #endif
61
62+#if !defined(NANO_TINY) && defined(HAVE_CHMOD) && defined(HAVE_CHOWN)
63+ /* Change permissions and owner of an emergency save file to the values
64+ * of the original file, but ignore any failure as we are in a hurry. */
65+ if (method == EMERGENCY && fd && openfile->statinfo) {
66+ IGNORE_CALL_RESULT(fchmod(fd, openfile->statinfo->st_mode));
67+ IGNORE_CALL_RESULT(fchown(fd, openfile->statinfo->st_uid,
68+ openfile->statinfo->st_gid));
69+ }
70+#endif
71+
72 if (fclose(thefile) != 0) {
73 statusline(ALERT, _("Error writing %s: %s"), realname, strerror(errno));
74
75diff --git a/src/nano.c b/src/nano.c
76index c6db6dd..c8e5265 100644
77--- a/src/nano.c
78+++ b/src/nano.c
79@@ -337,18 +337,8 @@ void emergency_save(const char *filename)
80
81 if (*targetname == '\0')
82 fprintf(stderr, _("\nToo many .save files\n"));
83- else if (write_file(targetname, NULL, SPECIAL, OVERWRITE, NONOTES)) {
84+ else if (write_file(targetname, NULL, SPECIAL, EMERGENCY, NONOTES))
85 fprintf(stderr, _("\nBuffer written to %s\n"), targetname);
86-#if !defined(NANO_TINY) && defined(HAVE_CHMOD) && defined(HAVE_CHOWN)
87- /* Try to chmod/chown the saved file to the values of the original file,
88- * but ignore any failure as we are in a hurry to get out. */
89- if (openfile->statinfo) {
90- IGNORE_CALL_RESULT(chmod(targetname, openfile->statinfo->st_mode));
91- IGNORE_CALL_RESULT(chown(targetname, openfile->statinfo->st_uid,
92- openfile->statinfo->st_gid));
93- }
94-#endif
95- }
96
97 free(targetname);
98 free(plainname);
99--
1002.44.0
101
diff --git a/meta-oe/recipes-support/nano/nano_7.2.bb b/meta-oe/recipes-support/nano/nano_7.2.bb
index 0642287c98..73d46949d9 100644
--- a/meta-oe/recipes-support/nano/nano_7.2.bb
+++ b/meta-oe/recipes-support/nano/nano_7.2.bb
@@ -12,7 +12,9 @@ RDEPENDS:${PN} = "ncurses-terminfo-base"
12 12
13PV_MAJOR = "${@d.getVar('PV').split('.')[0]}" 13PV_MAJOR = "${@d.getVar('PV').split('.')[0]}"
14 14
15SRC_URI = "https://nano-editor.org/dist/v${PV_MAJOR}/nano-${PV}.tar.xz" 15SRC_URI = "https://nano-editor.org/dist/v${PV_MAJOR}/nano-${PV}.tar.xz \
16 file://CVE-2024-5742.patch \
17 "
16SRC_URI[sha256sum] = "86f3442768bd2873cec693f83cdf80b4b444ad3cc14760b74361474fc87a4526" 18SRC_URI[sha256sum] = "86f3442768bd2873cec693f83cdf80b4b444ad3cc14760b74361474fc87a4526"
17 19
18UPSTREAM_CHECK_URI = "https://ftp.gnu.org/gnu/nano" 20UPSTREAM_CHECK_URI = "https://ftp.gnu.org/gnu/nano"