]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commit
dmidecode: fixup for CVE-2023-30630
authorAdrian Freihofer <adrian.freihofer@gmail.com>
Wed, 16 Aug 2023 10:58:20 +0000 (12:58 +0200)
committerSteve Sakoman <steve@sakoman.com>
Wed, 16 Aug 2023 16:11:05 +0000 (06:11 -1000)
commitea069a94a213cc153528aebfc387f30215566cc7
treefa5c065527375ad1ba379248c3db56088741812f
parent10df7553d1107438408f680ac28a2daf87d4163e
dmidecode: fixup for CVE-2023-30630

The previous CVE-2023-30630_1.patch picked only the patch
"dmidecode: Write the whole dump file at once" d8cfbc808f.
But there was a refactoring which does not allow to cherry-pick it fast
forward. Resolving this conflict was not correctly done. The patch was:

+    u32 len;
+    u8 *table;
...
-    if (!(opt.flags & FLAG_QUIET))
-        pr_comment("Writing %d bytes to %s.", crafted[0x05],
-                   opt.dumpfile);
-    write_dump(0, crafted[0x05], crafted, opt.dumpfile, 1);
+    dmi_table_dump(crafted, crafted[0x05], table, len);

It looks like the variables len and table have been added without
initialization.
Now this problem is solved by applying the previous refactoring as
well. Patch 1 gets replaced by Patch 1a and Patch 1b. Patch 2..4 are
rebased without changes.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-devtools/dmidecode/dmidecode/CVE-2023-30630_1a.patch [new file with mode: 0644]
meta/recipes-devtools/dmidecode/dmidecode/CVE-2023-30630_1b.patch [moved from meta/recipes-devtools/dmidecode/dmidecode/CVE-2023-30630_1.patch with 63% similarity]
meta/recipes-devtools/dmidecode/dmidecode/CVE-2023-30630_2.patch
meta/recipes-devtools/dmidecode/dmidecode/CVE-2023-30630_3.patch
meta/recipes-devtools/dmidecode/dmidecode/CVE-2023-30630_4.patch
meta/recipes-devtools/dmidecode/dmidecode_3.3.bb