fix cve-2021-3468
This commit is contained in:
parent
542d44c838
commit
b9bc00eba7
10
avahi.spec
10
avahi.spec
@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
Name: avahi
|
Name: avahi
|
||||||
Version: 0.8
|
Version: 0.8
|
||||||
Release: 5
|
Release: 6
|
||||||
Summary: Avahi is a local network service discovery
|
Summary: Avahi is a local network service discovery
|
||||||
License: LGPLv2+
|
License: LGPLv2+
|
||||||
URL: http://avahi.org
|
URL: http://avahi.org
|
||||||
@ -17,6 +17,8 @@ Patch3: 0003-fix-requires-in-pc-file.patch
|
|||||||
Patch4: 0004-fix-bytestring-decoding-for-proper-display.patch
|
Patch4: 0004-fix-bytestring-decoding-for-proper-display.patch
|
||||||
Patch5: 0005-avahi_dns_packet_consume_uint32-fix-potential-undefi.patch
|
Patch5: 0005-avahi_dns_packet_consume_uint32-fix-potential-undefi.patch
|
||||||
|
|
||||||
|
Patch6001: backport-CVE-2021-3468.patch
|
||||||
|
|
||||||
BuildRequires: gcc automake libtool desktop-file-utils gtk2-devel glib2-devel
|
BuildRequires: gcc automake libtool desktop-file-utils gtk2-devel glib2-devel
|
||||||
BuildRequires: libcap-devel expat-devel gdbm-devel
|
BuildRequires: libcap-devel expat-devel gdbm-devel
|
||||||
BuildRequires: intltool perl-XML-Parser xmltoman systemd libevent-devel
|
BuildRequires: intltool perl-XML-Parser xmltoman systemd libevent-devel
|
||||||
@ -518,6 +520,12 @@ fi
|
|||||||
%{_mandir}/man8/*
|
%{_mandir}/man8/*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Jun 15 2021 wangkerong <wangkerong@huawei.com> - 0.8-6
|
||||||
|
- Type:CVE
|
||||||
|
- ID:CVE-2021-3468
|
||||||
|
- SUG:NA
|
||||||
|
- DESC:fix CVE-2021-3468
|
||||||
|
|
||||||
* Thu May 20 2021 hanhui <hanhui15@huawei.com> - 0.8-5
|
* Thu May 20 2021 hanhui <hanhui15@huawei.com> - 0.8-5
|
||||||
- Type:enhancement
|
- Type:enhancement
|
||||||
- ID:NA
|
- ID:NA
|
||||||
|
|||||||
37
backport-CVE-2021-3468.patch
Normal file
37
backport-CVE-2021-3468.patch
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
From 447affe29991ee99c6b9732fc5f2c1048a611d3b Mon Sep 17 00:00:00 2001
|
||||||
|
From: Riccardo Schirone <sirmy15@gmail.com>
|
||||||
|
Date: Fri, 26 Mar 2021 11:50:24 +0100
|
||||||
|
Subject: [PATCH] Avoid infinite-loop in avahi-daemon by handling HUP event in
|
||||||
|
client_work
|
||||||
|
|
||||||
|
If a client fills the input buffer, client_work() disables the
|
||||||
|
AVAHI_WATCH_IN event, thus preventing the function from executing the
|
||||||
|
`read` syscall the next times it is called. However, if the client then
|
||||||
|
terminates the connection, the socket file descriptor receives a HUP
|
||||||
|
event, which is not handled, thus the kernel keeps marking the HUP event
|
||||||
|
as occurring. While iterating over the file descriptors that triggered
|
||||||
|
an event, the client file descriptor will keep having the HUP event and
|
||||||
|
the client_work() function is always called with AVAHI_WATCH_HUP but
|
||||||
|
without nothing being done, thus entering an infinite loop.
|
||||||
|
|
||||||
|
See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984938
|
||||||
|
---
|
||||||
|
avahi-daemon/simple-protocol.c | 5 +++++
|
||||||
|
1 file changed, 5 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/avahi-daemon/simple-protocol.c b/avahi-daemon/simple-protocol.c
|
||||||
|
index 3e0ebb11..6c0274d6 100644
|
||||||
|
--- a/avahi-daemon/simple-protocol.c
|
||||||
|
+++ b/avahi-daemon/simple-protocol.c
|
||||||
|
@@ -424,6 +424,11 @@ static void client_work(AvahiWatch *watch, AVAHI_GCC_UNUSED int fd, AvahiWatchEv
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if (events & AVAHI_WATCH_HUP) {
|
||||||
|
+ client_free(c);
|
||||||
|
+ return;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
c->server->poll_api->watch_update(
|
||||||
|
watch,
|
||||||
|
(c->outbuf_length > 0 ? AVAHI_WATCH_OUT : 0) |
|
||||||
Loading…
x
Reference in New Issue
Block a user