summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPeter Marko <peter.marko@siemens.com>2025-01-17 19:26:43 +0100
committerKhem Raj <raj.khem@gmail.com>2025-01-17 11:01:39 -0800
commit67d94fecb0dbd4f979b09a439c614ee4f01fc0c2 (patch)
tree4eecf3603f0c2b738840476a7d6fb5775749af0c
parent103c3392a8b286ae01a1e03bcd44ce36117fc4c8 (diff)
downloadmeta-openembedded-67d94fecb0dbd4f979b09a439c614ee4f01fc0c2.tar.gz
vorbis-tools: patch CVE-2023-43361
This is inactive project, so no official CVE fix will be available anymore. That however does not mean that there is no fix available. Following tries to prove that patch provided here is valid. NVD CVE report [1] links issue [2] where this is reported. Based on the report, fix was proposed in [3]. There was some review however the patch autor was not active. [4] was later created trying to adddress the comments, but the project was not active anymore. In this PR the patch was shrunk to a one-liner in discussion. I have tested the poc and it is real. The patch fixes it, while not breaking the execution if good file path is provided as argument. [1] https://nvd.nist.gov/vuln/detail/CVE-2023-43361 [2] https://github.com/xiph/vorbis-tools/issues/41 [3] https://gitlab.xiph.org/xiph/vorbis-tools/-/merge_requests/7 [4] https://gitlab.xiph.org/xiph/vorbis-tools/-/merge_requests/8 Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
-rw-r--r--meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools/CVE-2023-43361.patch38
-rw-r--r--meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools_1.4.2.bb1
2 files changed, 39 insertions, 0 deletions
diff --git a/meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools/CVE-2023-43361.patch b/meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools/CVE-2023-43361.patch
new file mode 100644
index 0000000000..7f5b634115
--- /dev/null
+++ b/meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools/CVE-2023-43361.patch
@@ -0,0 +1,38 @@
1From 6ca16244ba70cd1c0c8d062d1416bdc79bf20898 Mon Sep 17 00:00:00 2001
2From: Peter Marko <peter.marko@siemens.com>
3Date: Fri, 17 Jan 2025 18:49:12 +0100
4Subject: [PATCH] oggenc: Don't assume the output path ends in a file name.
5
6oggenc attempts to create any specified directories in the output
7file path if they don't exist. The parser was assuming there was
8a final filename after the last directory separator, and so would
9try to read off the end of the argument if it was a bare directory
10such as `./` or `outdir/`. This adds a check to make sure the
11scan isn't starting off the end of the path string.
12
13Thanks to Frank-Z7 (Zeng Yunxiang) at Huazhong University of Science
14and Technology (cse.hust.edu.cn) for the report.
15
16CVE: CVE-2023-43361
17Upstream-Status: Submitted [https://gitlab.xiph.org/xiph/vorbis-tools/-/merge_requests/7]
18Signed-off-by: Peter Marko <peter.marko@siemens.com>
19---
20 oggenc/platform.c | 2 +-
21 1 file changed, 1 insertion(+), 1 deletion(-)
22
23diff --git a/oggenc/platform.c b/oggenc/platform.c
24index 6d9f4ef..1ff02ca 100644
25--- a/oggenc/platform.c
26+++ b/oggenc/platform.c
27@@ -147,7 +147,7 @@ int create_directories(char *fn, int isutf8)
28 start = start+2;
29 #endif
30
31- while((end = strpbrk(start+1, PATH_SEPS)) != NULL)
32+ while((end = strpbrk(start + strspn(start, PATH_SEPS), PATH_SEPS)) != NULL)
33 {
34 int rv;
35 memcpy(segment, fn, end-fn);
36--
372.30.2
38
diff --git a/meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools_1.4.2.bb b/meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools_1.4.2.bb
index 61a4aedb85..2cbd840138 100644
--- a/meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools_1.4.2.bb
+++ b/meta-multimedia/recipes-multimedia/vorbis-tools/vorbis-tools_1.4.2.bb
@@ -13,6 +13,7 @@ DEPENDS = "libogg libvorbis"
13SRC_URI = "http://downloads.xiph.org/releases/vorbis/${BP}.tar.gz \ 13SRC_URI = "http://downloads.xiph.org/releases/vorbis/${BP}.tar.gz \
14 file://gettext.patch \ 14 file://gettext.patch \
15 file://0001-ogginfo-Include-utf8.h-for-missing-utf8_decode.patch \ 15 file://0001-ogginfo-Include-utf8.h-for-missing-utf8_decode.patch \
16 file://CVE-2023-43361.patch \
16 " 17 "
17 18
18SRC_URI[md5sum] = "998fca293bd4e4bdc2b96fb70f952f4e" 19SRC_URI[md5sum] = "998fca293bd4e4bdc2b96fb70f952f4e"