On Tue, Dec 8, 2020 at 5:16 AM Andrej Valek <andrej.va...@siemens.com> wrote:
>
> - move fixing patch for CVE-2020-8492 to the right location
>
> Signed-off-by: Andrej Valek <andrej.va...@siemens.com>
> ---
>  ...VE-2020-8492-Fix-AbstractBasicAuthHandler.patch |  0
>  .../python/python3/CVE-2019-20907.patch            | 73 
> ++++++++++++++++++++++
>  meta/recipes-devtools/python/python3_3.8.2.bb      |  1 +
>  3 files changed, 74 insertions(+)
>  rename meta/recipes-devtools/python/{files => 
> python3}/0001-bpo-39503-CVE-2020-8492-Fix-AbstractBasicAuthHandler.patch 
> (100%)
>  create mode 100644 meta/recipes-devtools/python/python3/CVE-2019-20907.patch
>
> diff --git 
> a/meta/recipes-devtools/python/files/0001-bpo-39503-CVE-2020-8492-Fix-AbstractBasicAuthHandler.patch
>  
> b/meta/recipes-devtools/python/python3/0001-bpo-39503-CVE-2020-8492-Fix-AbstractBasicAuthHandler.patch
> similarity index 100%
> rename from 
> meta/recipes-devtools/python/files/0001-bpo-39503-CVE-2020-8492-Fix-AbstractBasicAuthHandler.patch
> rename to 
> meta/recipes-devtools/python/python3/0001-bpo-39503-CVE-2020-8492-Fix-AbstractBasicAuthHandler.patch
> diff --git a/meta/recipes-devtools/python/python3/CVE-2019-20907.patch 
> b/meta/recipes-devtools/python/python3/CVE-2019-20907.patch
> new file mode 100644
> index 0000000000..135196f964
> --- /dev/null
> +++ b/meta/recipes-devtools/python/python3/CVE-2019-20907.patch
> @@ -0,0 +1,73 @@
> +From a06a6bf4e67a50561f6d6fb33534df1d3035ea34 Mon Sep 17 00:00:00 2001
> +From: Rishi <rishi_de...@mail.com>
> +Date: Wed, 15 Jul 2020 13:51:00 +0200
> +Subject: [PATCH] bpo-39017: Avoid infinite loop in the tarfile module
> + (GH-21454)
> +
> +Avoid infinite loop when reading specially crafted TAR files using the 
> tarfile module
> +(CVE-2019-20907).
> +(cherry picked from commit 5a8d121a1f3ef5ad7c105ee378cc79a3eac0c7d4)
> +
> +Co-authored-by: Rishi <rishi_de...@mail.com>
> +
> +Upstream-Status: Backport 
> [https://github.com/python/cpython/commit/c55479556db015f48fc8bbca17f64d3e65598559]
> +CVE: CVE-2019-20907
> +Signed-off-by: Andrej Valek <andrej.va...@siemens.com>
> +---
> + Lib/tarfile.py                                    |   2 ++
> + Lib/test/recursion.tar                            | Bin 0 -> 516 bytes
> + Lib/test/test_tarfile.py                          |   7 +++++++
> + .../2020-07-12-22-16-58.bpo-39017.x3Cg-9.rst      |   1 +
> + 4 files changed, 10 insertions(+)
> + create mode 100644 Lib/test/recursion.tar
> + create mode 100644 
> Misc/NEWS.d/next/Library/2020-07-12-22-16-58.bpo-39017.x3Cg-9.rst
> +
> +diff --git a/Lib/tarfile.py b/Lib/tarfile.py
> +index d31b9cbb51d65..7a69e1b1aa544 100755
> +--- a/Lib/tarfile.py
> ++++ b/Lib/tarfile.py
> +@@ -1241,6 +1241,8 @@ def _proc_pax(self, tarfile):
> +
> +             length, keyword = match.groups()
> +             length = int(length)
> ++            if length == 0:
> ++                raise InvalidHeaderError("invalid header")
> +             value = buf[match.end(2) + 1:match.start(1) + length - 1]
> +
> +             # Normally, we could just use "utf-8" as the encoding and 
> "strict"
> +diff --git a/Lib/test/recursion.tar b/Lib/test/recursion.tar
> +new file mode 100644
> +index 
> 0000000000000000000000000000000000000000..b8237251964983f54ed1966297e887636cd0c5f4
> +GIT binary patch

This binary patch section is causing autobuilder failures:

https://errors.yoctoproject.org/Errors/Details/539135/

Steve

> +literal 516
> +zcmYdFPRz+kEn=W0Fn}74P8%Xw3X=l~85kIuo0>8xq$A1Gm}!7)KUsFc41m#O8A5+e
> +I1_}|j06>QaCIA2c
> +
> +literal 0
> +HcmV?d00001
> +
> +diff --git a/Lib/test/test_tarfile.py b/Lib/test/test_tarfile.py
> +index 15324a4e48819..b512168d6ea87 100644
> +--- a/Lib/test/test_tarfile.py
> ++++ b/Lib/test/test_tarfile.py
> +@@ -397,6 +397,13 @@ def test_premature_end_of_archive(self):
> +                 with self.assertRaisesRegex(tarfile.ReadError, "unexpected 
> end of data"):
> +                     tar.extractfile(t).read()
> +
> ++    def test_length_zero_header(self):
> ++        # bpo-39017 (CVE-2019-20907): reading a zero-length header should 
> fail
> ++        # with an exception
> ++        with self.assertRaisesRegex(tarfile.ReadError, "file could not be 
> opened successfully"):
> ++            with tarfile.open(support.findfile('recursion.tar')) as tar:
> ++                pass
> ++
> + class MiscReadTestBase(CommonReadTest):
> +     def requires_name_attribute(self):
> +         pass
> +diff --git 
> a/Misc/NEWS.d/next/Library/2020-07-12-22-16-58.bpo-39017.x3Cg-9.rst 
> b/Misc/NEWS.d/next/Library/2020-07-12-22-16-58.bpo-39017.x3Cg-9.rst
> +new file mode 100644
> +index 0000000000000..ad26676f8b856
> +--- /dev/null
> ++++ b/Misc/NEWS.d/next/Library/2020-07-12-22-16-58.bpo-39017.x3Cg-9.rst
> +@@ -0,0 +1 @@
> ++Avoid infinite loop when reading specially crafted TAR files using the 
> tarfile module (CVE-2019-20907).
> diff --git a/meta/recipes-devtools/python/python3_3.8.2.bb 
> b/meta/recipes-devtools/python/python3_3.8.2.bb
> index b4cce88e87..9eddad4ad4 100644
> --- a/meta/recipes-devtools/python/python3_3.8.2.bb
> +++ b/meta/recipes-devtools/python/python3_3.8.2.bb
> @@ -33,6 +33,7 @@ SRC_URI = 
> "http://www.python.org/ftp/python/${PV}/Python-${PV}.tar.xz \
>             file://0001-python3-Do-not-hardcode-lib-for-distutils.patch \
>             
> file://0020-configure.ac-setup.py-do-not-add-a-curses-include-pa.patch \
>             
> file://0001-bpo-39503-CVE-2020-8492-Fix-AbstractBasicAuthHandler.patch \
> +           file://CVE-2019-20907.patch \
>             file://CVE-2020-14422.patch \
>             file://CVE-2020-26116.patch \
>             file://CVE-2020-27619.patch \
> --
> 2.11.0
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#145412): 
https://lists.openembedded.org/g/openembedded-core/message/145412
Mute This Topic: https://lists.openembedded.org/mt/78805261/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to