On Thu, Sep 2, 2021 at 8:10 AM Armin Kuster <akuster...@gmail.com> wrote:
>
> ping or did I miss a response to this patch?

No you didn't miss anything!

I mistakenly stashed this patch along with your "lz4: Security Fix for
CVE-2021-3520" patch in a branch waiting for the lz4 equivalent to hit
master.

Richard pushed the lz4 patch to master so now both patches are merged
and in test for dunfell.

Thanks!

Steve

>
> -armin
>
> On 8/27/21 8:37 PM, Armin Kuster via lists.openembedded.org wrote:
> > From: Armin Kuster <akus...@mvista.com>
> >
> > Source: https://gitlab.freedesktop.org/dbu
> > MR: 108825
> > Type: Security Fix
> > Disposition: Backport from 
> > https://gitlab.freedesktop.org/dbus/dbus/-/commit/e75c67a28fa2bc41a8ab0de433a52355c71a8abf
> > ChangeID: dea9518b9c13dab66e7d553c622000b9c6e268cc
> > Description:
> >
> > Affects: < 1.12.20
> >
> > Signed-off-by: Armin Kuster <akus...@mvista.com>
> > ---
> >  .../dbus/dbus/CVE-2020-35512.patch            | 301 ++++++++++++++++++
> >  meta/recipes-core/dbus/dbus_1.12.16.bb        |   1 +
> >  2 files changed, 302 insertions(+)
> >  create mode 100644 meta/recipes-core/dbus/dbus/CVE-2020-35512.patch
> >
> > diff --git a/meta/recipes-core/dbus/dbus/CVE-2020-35512.patch 
> > b/meta/recipes-core/dbus/dbus/CVE-2020-35512.patch
> > new file mode 100644
> > index 0000000000..27f5d58675
> > --- /dev/null
> > +++ b/meta/recipes-core/dbus/dbus/CVE-2020-35512.patch
> > @@ -0,0 +1,301 @@
> > +From 2b7948ef907669e844b52c4fa2268d6e3162a70c Mon Sep 17 00:00:00 2001
> > +From: Simon McVittie <s...@collabora.com>
> > +Date: Tue, 30 Jun 2020 19:29:06 +0100
> > +Subject: [PATCH] userdb: Reference-count DBusUserInfo, DBusGroupInfo
> > +
> > +Previously, the hash table indexed by uid (or gid) took ownership of the
> > +single reference to the heap-allocated struct, and the hash table
> > +indexed by username (or group name) had a borrowed pointer to the same
> > +struct that exists in the other hash table.
> > +
> > +However, this can break down if you have two or more distinct usernames
> > +that share a numeric identifier. This is generally a bad idea, because
> > +the user-space model in such situations does not match the kernel-space
> > +reality, and in particular there is no effective kernel-level security
> > +boundary between such users, but it is sometimes done anyway.
> > +
> > +In this case, when the second username is looked up in the userdb, it
> > +overwrites (replaces) the entry in the hash table that is indexed by
> > +uid, freeing the DBusUserInfo. This results in both the key and the
> > +value in the hash table that is indexed by username becoming dangling
> > +pointers (use-after-free), leading to undefined behaviour, which is
> > +certainly not what we want to see when doing access control.
> > +
> > +An equivalent situation can occur with groups, in the rare case where
> > +a numeric group ID has two names (although I have not heard of this
> > +being done in practice).
> > +
> > +Solve this by reference-counting the data structure. There are up to
> > +three references in practice: one held temporarily while the lookup
> > +function is populating and storing it, one held by the hash table that
> > +is indexed by uid, and one held by the hash table that is indexed by
> > +name.
> > +
> > +Closes: dbus#305
> > +Signed-off-by: Simon McVittie <s...@collabora.com>
> > +
> > +Upsteam-Status: Backport
> > +https://gitlab.freedesktop.org/dbus/dbus/-/commit/e75c67a28fa2bc41a8ab0de433a52355c71a8abf
> > +CVE: CVE-2020-35512
> > +Signed-off-by: Armin Kuster <akus...@mvista.com>
> > +
> > +---
> > + dbus/dbus-sysdeps-unix.h |  2 ++
> > + dbus/dbus-userdb-util.c  | 38 ++++++++++++++++++-----
> > + dbus/dbus-userdb.c       | 67 ++++++++++++++++++++++++++++++----------
> > + dbus/dbus-userdb.h       |  6 ++--
> > + 4 files changed, 86 insertions(+), 27 deletions(-)
> > +
> > +Index: dbus-1.12.16/dbus/dbus-sysdeps-unix.h
> > +===================================================================
> > +--- dbus-1.12.16.orig/dbus/dbus-sysdeps-unix.h
> > ++++ dbus-1.12.16/dbus/dbus-sysdeps-unix.h
> > +@@ -105,6 +105,7 @@ typedef struct DBusGroupInfo DBusGroupIn
> > +  */
> > + struct DBusUserInfo
> > + {
> > ++  size_t      refcount;       /**< Reference count */
> > +   dbus_uid_t  uid;            /**< UID */
> > +   dbus_gid_t  primary_gid;    /**< GID */
> > +   dbus_gid_t *group_ids;      /**< Groups IDs, *including* above primary 
> > group */
> > +@@ -118,6 +119,7 @@ struct DBusUserInfo
> > +  */
> > + struct DBusGroupInfo
> > + {
> > ++  size_t      refcount;       /**< Reference count */
> > +   dbus_gid_t  gid;            /**< GID */
> > +   char       *groupname;      /**< Group name */
> > + };
> > +Index: dbus-1.12.16/dbus/dbus-userdb-util.c
> > +===================================================================
> > +--- dbus-1.12.16.orig/dbus/dbus-userdb-util.c
> > ++++ dbus-1.12.16/dbus/dbus-userdb-util.c
> > +@@ -38,6 +38,15 @@
> > +  * @{
> > +  */
> > +
> > ++static DBusGroupInfo *
> > ++_dbus_group_info_ref (DBusGroupInfo *info)
> > ++{
> > ++  _dbus_assert (info->refcount > 0);
> > ++  _dbus_assert (info->refcount < SIZE_MAX);
> > ++  info->refcount++;
> > ++  return info;
> > ++}
> > ++
> > + /**
> > +  * Checks to see if the UID sent in is the console user
> > +  *
> > +@@ -240,9 +249,9 @@ _dbus_get_user_id_and_primary_group (con
> > +  * @param gid the group ID or #DBUS_GID_UNSET
> > +  * @param groupname group name or #NULL
> > +  * @param error error to fill in
> > +- * @returns the entry in the database
> > ++ * @returns the entry in the database (borrowed, do not free)
> > +  */
> > +-DBusGroupInfo*
> > ++const DBusGroupInfo*
> > + _dbus_user_database_lookup_group (DBusUserDatabase *db,
> > +                                   dbus_gid_t        gid,
> > +                                   const DBusString *groupname,
> > +@@ -287,13 +296,14 @@ _dbus_user_database_lookup_group (DBusUs
> > +           dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
> > +           return NULL;
> > +         }
> > ++      info->refcount = 1;
> > +
> > +       if (gid != DBUS_GID_UNSET)
> > +         {
> > +           if (!_dbus_group_info_fill_gid (info, gid, error))
> > +             {
> > +               _DBUS_ASSERT_ERROR_IS_SET (error);
> > +-              _dbus_group_info_free_allocated (info);
> > ++              _dbus_group_info_unref (info);
> > +               return NULL;
> > +             }
> > +         }
> > +@@ -302,7 +312,7 @@ _dbus_user_database_lookup_group (DBusUs
> > +           if (!_dbus_group_info_fill (info, groupname, error))
> > +             {
> > +               _DBUS_ASSERT_ERROR_IS_SET (error);
> > +-              _dbus_group_info_free_allocated (info);
> > ++              _dbus_group_info_unref (info);
> > +               return NULL;
> > +             }
> > +         }
> > +@@ -314,7 +324,7 @@ _dbus_user_database_lookup_group (DBusUs
> > +       if (!_dbus_hash_table_insert_uintptr (db->groups, info->gid, info))
> > +         {
> > +           dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
> > +-          _dbus_group_info_free_allocated (info);
> > ++          _dbus_group_info_unref (info);
> > +           return NULL;
> > +         }
> > +
> > +Index: dbus-1.12.16/dbus/dbus-userdb.c
> > +===================================================================
> > +--- dbus-1.12.16.orig/dbus/dbus-userdb.c
> > ++++ dbus-1.12.16/dbus/dbus-userdb.c
> > +@@ -35,34 +35,57 @@
> > +  * @{
> > +  */
> > +
> > ++static DBusUserInfo *
> > ++_dbus_user_info_ref (DBusUserInfo *info)
> > ++{
> > ++  _dbus_assert (info->refcount > 0);
> > ++  _dbus_assert (info->refcount < SIZE_MAX);
> > ++  info->refcount++;
> > ++  return info;
> > ++}
> > ++
> > + /**
> > +- * Frees the given #DBusUserInfo's members with _dbus_user_info_free()
> > ++ * Decrements the reference count. If it reaches 0,
> > ++ * frees the given #DBusUserInfo's members with _dbus_user_info_free()
> > +  * and also calls dbus_free() on the block itself
> > +  *
> > +  * @param info the info
> > +  */
> > + void
> > +-_dbus_user_info_free_allocated (DBusUserInfo *info)
> > ++_dbus_user_info_unref (DBusUserInfo *info)
> > + {
> > +   if (info == NULL) /* hash table will pass NULL */
> > +     return;
> > +
> > ++  _dbus_assert (info->refcount > 0);
> > ++  _dbus_assert (info->refcount < SIZE_MAX);
> > ++
> > ++  if (--info->refcount > 0)
> > ++    return;
> > ++
> > +   _dbus_user_info_free (info);
> > +   dbus_free (info);
> > + }
> > +
> > + /**
> > +- * Frees the given #DBusGroupInfo's members with _dbus_group_info_free()
> > ++ * Decrements the reference count. If it reaches 0,
> > ++ * frees the given #DBusGroupInfo's members with _dbus_group_info_free()
> > +  * and also calls dbus_free() on the block itself
> > +  *
> > +  * @param info the info
> > +  */
> > + void
> > +-_dbus_group_info_free_allocated (DBusGroupInfo *info)
> > ++_dbus_group_info_unref (DBusGroupInfo *info)
> > + {
> > +   if (info == NULL) /* hash table will pass NULL */
> > +     return;
> > +
> > ++  _dbus_assert (info->refcount > 0);
> > ++  _dbus_assert (info->refcount < SIZE_MAX);
> > ++
> > ++  if (--info->refcount > 0)
> > ++    return;
> > ++
> > +   _dbus_group_info_free (info);
> > +   dbus_free (info);
> > + }
> > +@@ -124,7 +147,7 @@ _dbus_is_a_number (const DBusString *str
> > +  * @param error error to fill in
> > +  * @returns the entry in the database
> > +  */
> > +-DBusUserInfo*
> > ++const DBusUserInfo*
> > + _dbus_user_database_lookup (DBusUserDatabase *db,
> > +                             dbus_uid_t        uid,
> > +                             const DBusString *username,
> > +@@ -170,13 +193,14 @@ _dbus_user_database_lookup (DBusUserData
> > +           dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
> > +           return NULL;
> > +         }
> > ++      info->refcount = 1;
> > +
> > +       if (uid != DBUS_UID_UNSET)
> > +         {
> > +           if (!_dbus_user_info_fill_uid (info, uid, error))
> > +             {
> > +               _DBUS_ASSERT_ERROR_IS_SET (error);
> > +-              _dbus_user_info_free_allocated (info);
> > ++              _dbus_user_info_unref (info);
> > +               return NULL;
> > +             }
> > +         }
> > +@@ -185,7 +209,7 @@ _dbus_user_database_lookup (DBusUserData
> > +           if (!_dbus_user_info_fill (info, username, error))
> > +             {
> > +               _DBUS_ASSERT_ERROR_IS_SET (error);
> > +-              _dbus_user_info_free_allocated (info);
> > ++              _dbus_user_info_unref (info);
> > +               return NULL;
> > +             }
> > +         }
> > +@@ -198,7 +222,7 @@ _dbus_user_database_lookup (DBusUserData
> > +       if (!_dbus_hash_table_insert_uintptr (db->users, info->uid, info))
> > +         {
> > +           dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
> > +-          _dbus_user_info_free_allocated (info);
> > ++          _dbus_user_info_unref(info);
> > +           return NULL;
> > +         }
> > +
> > +@@ -568,24 +592,24 @@ _dbus_user_database_new (void)
> > +   db->refcount = 1;
> > +
> > +   db->users = _dbus_hash_table_new (DBUS_HASH_UINTPTR,
> > +-                                    NULL, (DBusFreeFunction) 
> > _dbus_user_info_free_allocated);
> > ++                                    NULL, (DBusFreeFunction) 
> > _dbus_user_info_unref);
> > +
> > +   if (db->users == NULL)
> > +     goto failed;
> > +
> > +   db->groups = _dbus_hash_table_new (DBUS_HASH_UINTPTR,
> > +-                                     NULL, (DBusFreeFunction) 
> > _dbus_group_info_free_allocated);
> > ++                                     NULL, (DBusFreeFunction) 
> > _dbus_group_info_unref);
> > +
> > +   if (db->groups == NULL)
> > +     goto failed;
> > +
> > +   db->users_by_name = _dbus_hash_table_new (DBUS_HASH_STRING,
> > +-                                            NULL, NULL);
> > ++                                            NULL, (DBusFreeFunction) 
> > _dbus_user_info_unref);
> > +   if (db->users_by_name == NULL)
> > +     goto failed;
> > +
> > +   db->groups_by_name = _dbus_hash_table_new (DBUS_HASH_STRING,
> > +-                                             NULL, NULL);
> > ++                                             NULL, (DBusFreeFunction) 
> > _dbus_group_info_unref);
> > +   if (db->groups_by_name == NULL)
> > +     goto failed;
> > +
> > +Index: dbus-1.12.16/dbus/dbus-userdb.h
> > +===================================================================
> > +--- dbus-1.12.16.orig/dbus/dbus-userdb.h
> > ++++ dbus-1.12.16/dbus/dbus-userdb.h
> > +@@ -76,19 +76,19 @@ dbus_bool_t       _dbus_user_database_ge
> > +                                                      DBusError            
> > *error);
> > +
> > + DBUS_PRIVATE_EXPORT
> > +-DBusUserInfo*  _dbus_user_database_lookup       (DBusUserDatabase *db,
> > ++const DBusUserInfo*  _dbus_user_database_lookup       (DBusUserDatabase 
> > *db,
> > +                                                  dbus_uid_t        uid,
> > +                                                  const DBusString 
> > *username,
> > +                                                  DBusError        *error);
> > + DBUS_PRIVATE_EXPORT
> > +-DBusGroupInfo* _dbus_user_database_lookup_group (DBusUserDatabase *db,
> > ++const DBusGroupInfo* _dbus_user_database_lookup_group (DBusUserDatabase 
> > *db,
> > +                                                  dbus_gid_t        gid,
> > +                                                  const DBusString 
> > *groupname,
> > +                                                  DBusError        *error);
> > ++
> > ++void            _dbus_user_info_unref    (DBusUserInfo     *info);
> > + DBUS_PRIVATE_EXPORT
> > +-void           _dbus_user_info_free_allocated   (DBusUserInfo     *info);
> > +-DBUS_PRIVATE_EXPORT
> > +-void           _dbus_group_info_free_allocated  (DBusGroupInfo    *info);
> > ++void           _dbus_group_info_unref           (DBusGroupInfo    *info);
> > + #endif /* DBUS_USERDB_INCLUDES_PRIVATE */
> > +
> > + DBUS_PRIVATE_EXPORT
> > diff --git a/meta/recipes-core/dbus/dbus_1.12.16.bb 
> > b/meta/recipes-core/dbus/dbus_1.12.16.bb
> > index 10d1b34448..13d453eb32 100644
> > --- a/meta/recipes-core/dbus/dbus_1.12.16.bb
> > +++ b/meta/recipes-core/dbus/dbus_1.12.16.bb
> > @@ -17,6 +17,7 @@ SRC_URI = 
> > "https://dbus.freedesktop.org/releases/dbus/dbus-${PV}.tar.gz \
> >             file://dbus-1.init \
> >             file://clear-guid_from_server-if-send_negotiate_unix_f.patch \
> >             file://CVE-2020-12049.patch \
> > +           file://CVE-2020-35512.patch \
> >  "
> >
> >  SRC_URI[md5sum] = "2dbeae80dfc9e3632320c6a53d5e8890"
> >
> >
> >
>
>
> 
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#155642): 
https://lists.openembedded.org/g/openembedded-core/message/155642
Mute This Topic: https://lists.openembedded.org/mt/85202264/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to