mirror of
git://git.openembedded.org/meta-openembedded
synced 2026-01-01 13:58:06 +00:00
exiv2: Fix CVE-2021-29457
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29457
The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file.
An attacker could potentially exploit the vulnerability to gain code execution, if they can
trick the victim into running Exiv2 on a crafted image file.
Upstream-Status: Accepted [0230620e6e]
CVE: CVE-2021-29457
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
This commit is contained in:
parent
bdf1be7c55
commit
5be7269309
26
meta-oe/recipes-support/exiv2/exiv2/CVE-2021-29457.patch
Normal file
26
meta-oe/recipes-support/exiv2/exiv2/CVE-2021-29457.patch
Normal file
|
|
@ -0,0 +1,26 @@
|
|||
From 13e5a3e02339b746abcaee6408893ca2fd8e289d Mon Sep 17 00:00:00 2001
|
||||
From: Pydera <pydera@mailbox.org>
|
||||
Date: Thu, 8 Apr 2021 17:36:16 +0200
|
||||
Subject: [PATCH] Fix out of buffer access in #1529
|
||||
|
||||
---
|
||||
src/jp2image.cpp | 5 +++--
|
||||
1 file changed, 3 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/src/jp2image.cpp b/src/jp2image.cpp
|
||||
index 88ab9b2d6..12025f966 100644
|
||||
--- a/src/jp2image.cpp
|
||||
+++ b/src/jp2image.cpp
|
||||
@@ -776,9 +776,10 @@ static void boxes_check(size_t b,size_t m)
|
||||
#endif
|
||||
box.length = (uint32_t) (io_->size() - io_->tell() + 8);
|
||||
}
|
||||
- if (box.length == 1)
|
||||
+ if (box.length < 8)
|
||||
{
|
||||
- // FIXME. Special case. the real box size is given in another place.
|
||||
+ // box is broken, so there is nothing we can do here
|
||||
+ throw Error(kerCorruptedMetadata);
|
||||
}
|
||||
|
||||
// Read whole box : Box header + Box data (not fixed size - can be null).
|
||||
|
|
@ -9,7 +9,8 @@ SRC_URI[sha256sum] = "a79f5613812aa21755d578a297874fb59a85101e793edc64ec2c6bd994
|
|||
|
||||
# Once patch is obsolete (project should be aware due to PRs), dos2unix can be removed either
|
||||
inherit dos2unix
|
||||
SRC_URI += "file://0001-Use-compiler-fcf-protection-only-if-compiler-arch-su.patch"
|
||||
SRC_URI += "file://0001-Use-compiler-fcf-protection-only-if-compiler-arch-su.patch \
|
||||
file://CVE-2021-29457.patch"
|
||||
|
||||
S = "${WORKDIR}/${BPN}-${PV}-Source"
|
||||
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user