* [bug#28933] [PATCH] gnu: glibc: Fix CVE-2017-15670, CVE-2017-15671.
@ 2017-10-21 21:17 Marius Bakke
2017-10-22 18:19 ` Leo Famulari
0 siblings, 1 reply; 4+ messages in thread
From: Marius Bakke @ 2017-10-21 21:17 UTC (permalink / raw)
To: 28933
* gnu/packages/patches/glibc-CVE-2017-15670-15671.patch: New file.
* gnu/local.mk (dist_patch_DATA): Register it.
* gnu/packages/base.scm (glibc/linux)[replacement]: New field.
(glibc/fixed): New variable.
---
gnu/local.mk | 1 +
gnu/packages/base.scm | 10 ++++++++
.../patches/glibc-CVE-2017-15670-15671.patch | 27 ++++++++++++++++++++++
3 files changed, 38 insertions(+)
create mode 100644 gnu/packages/patches/glibc-CVE-2017-15670-15671.patch
diff --git a/gnu/local.mk b/gnu/local.mk
index a4e3426f5..6b70300ff 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -665,6 +665,7 @@ dist_patch_DATA = \
%D%/packages/patches/glibc-CVE-2017-1000366-pt1.patch \
%D%/packages/patches/glibc-CVE-2017-1000366-pt2.patch \
%D%/packages/patches/glibc-CVE-2017-1000366-pt3.patch \
+ %D%/packages/patches/glibc-CVE-2017-15670-15671.patch \
%D%/packages/patches/glibc-bootstrap-system.patch \
%D%/packages/patches/glibc-ldd-x86_64.patch \
%D%/packages/patches/glibc-locales.patch \
diff --git a/gnu/packages/base.scm b/gnu/packages/base.scm
index bc745351a..9c2ca149a 100644
--- a/gnu/packages/base.scm
+++ b/gnu/packages/base.scm
@@ -528,6 +528,7 @@ store.")
(package
(name "glibc")
(version "2.25")
+ (replacement glibc/fixed)
(source (origin
(method url-fetch)
(uri (string-append "mirror://gnu/glibc/glibc-"
@@ -786,6 +787,15 @@ GLIBC/HURD for a Hurd host"
(define-syntax glibc
(identifier-syntax (glibc-for-target)))
+(define glibc/fixed
+ (package
+ (inherit glibc)
+ (source (origin
+ (inherit (package-source glibc))
+ (patches (append
+ (origin-patches (package-source glibc))
+ (search-patches "glibc-CVE-2017-15670-15671.patch")))))))
+
;; Below are old libc versions, which we use mostly to build locale data in
;; the old format (which the new libc cannot cope with.)
diff --git a/gnu/packages/patches/glibc-CVE-2017-15670-15671.patch b/gnu/packages/patches/glibc-CVE-2017-15670-15671.patch
new file mode 100644
index 000000000..76d688c51
--- /dev/null
+++ b/gnu/packages/patches/glibc-CVE-2017-15670-15671.patch
@@ -0,0 +1,27 @@
+Fix CVE-2017-15670:
+
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
+https://sourceware.org/bugzilla/show_bug.cgi?id=22320
+https://bugzilla.redhat.com/show_bug.cgi?id=1504804
+
+And CVE-2017-15671:
+
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
+https://sourceware.org/bugzilla/show_bug.cgi?id=22325
+https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15671
+
+Copied from upstream:
+<https://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=2d1bd71ec70a31b01d01b734faa66bb1ed28961f>
+
+diff --git a/posix/glob.c b/posix/glob.c
+--- a/posix/glob.c
++++ b/posix/glob.c
+@@ -843,7 +843,7 @@
+ *p = '\0';
+ }
+ else
+- *((char *) mempcpy (newp, dirname + 1, end_name - dirname))
++ *((char *) mempcpy (newp, dirname + 1, end_name - dirname - 1))
+ = '\0';
+ user_name = newp;
+ }
--
2.14.2
^ permalink raw reply related [flat|nested] 4+ messages in thread
* [bug#28933] [PATCH] gnu: glibc: Fix CVE-2017-15670, CVE-2017-15671.
2017-10-21 21:17 [bug#28933] [PATCH] gnu: glibc: Fix CVE-2017-15670, CVE-2017-15671 Marius Bakke
@ 2017-10-22 18:19 ` Leo Famulari
2017-10-22 18:36 ` Marius Bakke
0 siblings, 1 reply; 4+ messages in thread
From: Leo Famulari @ 2017-10-22 18:19 UTC (permalink / raw)
To: Marius Bakke; +Cc: Mark H. Weaver, 28933
[-- Attachment #1: Type: text/plain, Size: 412 bytes --]
On Sat, Oct 21, 2017 at 11:17:32PM +0200, Marius Bakke wrote:
> * gnu/packages/patches/glibc-CVE-2017-15670-15671.patch: New file.
> * gnu/local.mk (dist_patch_DATA): Register it.
> * gnu/packages/base.scm (glibc/linux)[replacement]: New field.
> (glibc/fixed): New variable.
Thanks!
Do you think we need to do anything special with the glibc packages
besides glibc/linux, such as glibc/hurd, glibc-2.24, etc?
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 4+ messages in thread
* [bug#28933] [PATCH] gnu: glibc: Fix CVE-2017-15670, CVE-2017-15671.
2017-10-22 18:19 ` Leo Famulari
@ 2017-10-22 18:36 ` Marius Bakke
2017-10-22 21:15 ` bug#28933: " Marius Bakke
0 siblings, 1 reply; 4+ messages in thread
From: Marius Bakke @ 2017-10-22 18:36 UTC (permalink / raw)
To: Leo Famulari; +Cc: Mark H. Weaver, 28933
[-- Attachment #1: Type: text/plain, Size: 986 bytes --]
Leo Famulari <leo@famulari.name> writes:
> On Sat, Oct 21, 2017 at 11:17:32PM +0200, Marius Bakke wrote:
>> * gnu/packages/patches/glibc-CVE-2017-15670-15671.patch: New file.
>> * gnu/local.mk (dist_patch_DATA): Register it.
>> * gnu/packages/base.scm (glibc/linux)[replacement]: New field.
>> (glibc/fixed): New variable.
>
> Thanks!
>
> Do you think we need to do anything special with the glibc packages
> besides glibc/linux, such as glibc/hurd, glibc-2.24, etc?
It probably should be picked to the earlier glibcs as well, IIRC the
affected code was from 1997. I'll try this and amend the patch.
Not sure about glibc/hurd, but I notice it does not have the other
security patches that 'glibc-2.23' has. Picking those should be left to
someone able to easily test it IMO.
Side-note: I was really surprised that grafting glibc had become *this
easy*, but it seems to work in my testing. I'll push this after
patching the older glibc variants unless there are further comments.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]
^ permalink raw reply [flat|nested] 4+ messages in thread
* bug#28933: [PATCH] gnu: glibc: Fix CVE-2017-15670, CVE-2017-15671.
2017-10-22 18:36 ` Marius Bakke
@ 2017-10-22 21:15 ` Marius Bakke
0 siblings, 0 replies; 4+ messages in thread
From: Marius Bakke @ 2017-10-22 21:15 UTC (permalink / raw)
To: Leo Famulari; +Cc: Mark H. Weaver, 28933-done
[-- Attachment #1: Type: text/plain, Size: 728 bytes --]
Marius Bakke <mbakke@fastmail.com> writes:
> Leo Famulari <leo@famulari.name> writes:
>
>> On Sat, Oct 21, 2017 at 11:17:32PM +0200, Marius Bakke wrote:
>>> * gnu/packages/patches/glibc-CVE-2017-15670-15671.patch: New file.
>>> * gnu/local.mk (dist_patch_DATA): Register it.
>>> * gnu/packages/base.scm (glibc/linux)[replacement]: New field.
>>> (glibc/fixed): New variable.
>>
>> Thanks!
>>
>> Do you think we need to do anything special with the glibc packages
>> besides glibc/linux, such as glibc/hurd, glibc-2.24, etc?
>
> It probably should be picked to the earlier glibcs as well, IIRC the
> affected code was from 1997. I'll try this and amend the patch.
Pushed to master as 60e29339d8389e678bb9ca4bd3420ee9ee88bdf2.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2017-10-22 21:16 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-10-21 21:17 [bug#28933] [PATCH] gnu: glibc: Fix CVE-2017-15670, CVE-2017-15671 Marius Bakke
2017-10-22 18:19 ` Leo Famulari
2017-10-22 18:36 ` Marius Bakke
2017-10-22 21:15 ` bug#28933: " Marius Bakke
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/guix.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.