- security update
- added patches fix CVE-2021-3594 [bsc#1187367], invalid pointer initialization may lead to information disclosure (udp) + apr-CVE-2021-3594.patch OBS-URL: https://build.opensuse.org/package/show/Apache/apr?expand=0&rev=35
This commit is contained in:
parent
825d73e9d5
commit
bc6a690024
56
apr-CVE-2021-3594.patch
Normal file
56
apr-CVE-2021-3594.patch
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
--- 1.7.x/random/unix/sha2.c 2021/07/02 11:07:15 1891197
|
||||||
|
+++ 1.7.x/random/unix/sha2.c 2021/07/02 11:10:33 1891198
|
||||||
|
@@ -425,7 +425,7 @@
|
||||||
|
usedspace = freespace = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
-void apr__SHA256_Final(sha2_byte digest[], SHA256_CTX* context) {
|
||||||
|
+void apr__SHA256_Final(sha2_byte digest[SHA256_DIGEST_LENGTH], SHA256_CTX* context) {
|
||||||
|
sha2_word32 *d = (sha2_word32*)digest;
|
||||||
|
unsigned int usedspace;
|
||||||
|
|
||||||
|
@@ -496,7 +496,7 @@
|
||||||
|
usedspace = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
-char *apr__SHA256_End(SHA256_CTX* context, char buffer[]) {
|
||||||
|
+char *apr__SHA256_End(SHA256_CTX* context, char buffer[SHA256_DIGEST_STRING_LENGTH]) {
|
||||||
|
sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest;
|
||||||
|
int i;
|
||||||
|
|
||||||
|
--- 1.7.x/time/unix/time.c 2021/07/02 11:07:15 1891197
|
||||||
|
+++ 1.7.x/time/unix/time.c 2021/07/02 11:10:33 1891198
|
||||||
|
@@ -142,6 +142,9 @@
|
||||||
|
static const int dayoffset[12] =
|
||||||
|
{306, 337, 0, 31, 61, 92, 122, 153, 184, 214, 245, 275};
|
||||||
|
|
||||||
|
+ if (xt->tm_mon < 0 || xt->tm_mon >= 12)
|
||||||
|
+ return APR_EBADDATE;
|
||||||
|
+
|
||||||
|
/* shift new year to 1st March in order to make leap year calc easy */
|
||||||
|
|
||||||
|
if (xt->tm_mon < 2)
|
||||||
|
--- 1.7.x/time/win32/time.c 2021/07/02 11:07:15 1891197
|
||||||
|
+++ 1.7.x/time/win32/time.c 2021/07/02 11:10:33 1891198
|
||||||
|
@@ -54,6 +54,9 @@ static void SystemTimeToAprExpTime(apr_t
|
||||||
|
static const int dayoffset[12] =
|
||||||
|
{0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334};
|
||||||
|
|
||||||
|
+ if (tm->wMonth < 1 || tm->wMonth > 12)
|
||||||
|
+ return APR_EBADDATE;
|
||||||
|
+
|
||||||
|
/* Note; the caller is responsible for filling in detailed tm_usec,
|
||||||
|
* tm_gmtoff and tm_isdst data when applicable.
|
||||||
|
*/
|
||||||
|
@@ -228,6 +231,9 @@ APR_DECLARE(apr_status_t) apr_time_exp_g
|
||||||
|
static const int dayoffset[12] =
|
||||||
|
{306, 337, 0, 31, 61, 92, 122, 153, 184, 214, 245, 275};
|
||||||
|
|
||||||
|
+ if (xt->tm_mon < 0 || xt->tm_mon >= 12)
|
||||||
|
+ return APR_EBADDATE;
|
||||||
|
+
|
||||||
|
/* shift new year to 1st March in order to make leap year calc easy */
|
||||||
|
|
||||||
|
if (xt->tm_mon < 2)
|
||||||
|
|
||||||
|
|
@ -1,3 +1,11 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Sep 2 07:15:59 UTC 2021 - pgajdos@suse.com
|
||||||
|
|
||||||
|
- security update
|
||||||
|
- added patches
|
||||||
|
fix CVE-2021-3594 [bsc#1187367], invalid pointer initialization may lead to information disclosure (udp)
|
||||||
|
+ apr-CVE-2021-3594.patch
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat Aug 3 14:11:24 UTC 2019 - Manu Maier <mmanu84@outlook.de>
|
Sat Aug 3 14:11:24 UTC 2019 - Manu Maier <mmanu84@outlook.de>
|
||||||
|
|
||||||
|
5
apr.spec
5
apr.spec
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package apr
|
# spec file for package apr
|
||||||
#
|
#
|
||||||
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
|
# Copyright (c) 2021 SUSE LLC
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
# remain the property of their copyright owners, unless otherwise agreed
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
@ -34,6 +34,8 @@ Patch5: apr-visibility.patch
|
|||||||
Patch9: apr-proc-mutex-map-anon.patch
|
Patch9: apr-proc-mutex-map-anon.patch
|
||||||
# prevent random failures of the testsuite (sendfile test)
|
# prevent random failures of the testsuite (sendfile test)
|
||||||
Patch10: apr-test-sendfile-timeout.patch
|
Patch10: apr-test-sendfile-timeout.patch
|
||||||
|
# CVE-2021-3594 [bsc#1187367], invalid pointer initialization may lead to information disclosure (udp)
|
||||||
|
Patch11: apr-CVE-2021-3594.patch
|
||||||
BuildRequires: doxygen
|
BuildRequires: doxygen
|
||||||
BuildRequires: fdupes
|
BuildRequires: fdupes
|
||||||
BuildRequires: libtool
|
BuildRequires: libtool
|
||||||
@ -86,6 +88,7 @@ that want to make use of APR.
|
|||||||
%patch5 -p1
|
%patch5 -p1
|
||||||
%patch9 -p1
|
%patch9 -p1
|
||||||
%patch10 -p1
|
%patch10 -p1
|
||||||
|
%patch11 -p1
|
||||||
|
|
||||||
# Do not put date to doxy content
|
# Do not put date to doxy content
|
||||||
sed -i \
|
sed -i \
|
||||||
|
Loading…
x
Reference in New Issue
Block a user