acpid: CVE-2011-1159
acpid.c in acpid before 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a crafted application that performs a connect system call but no read system calls. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1159 (From OE-Core master rev: e7b2b84dece29d16b8f05daf962b69e78dd64cb3) (From OE-Core rev: 56f1ea2cd8eeb189ee345f215deb5867a77cd0a1) Signed-off-by: Yue Tao <yue.tao@windriver.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Mark Hatle <mark.hatle@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
parent
a64da6a9b3
commit
d426450b0b
|
@ -6,7 +6,8 @@ LICENSE="GPLv2+"
|
|||
|
||||
SECTION = "base"
|
||||
SRC_URI = "${SOURCEFORGE_MIRROR}/acpid/acpid-${PV}.tar.gz \
|
||||
file://init"
|
||||
file://init \
|
||||
file://set_socket_noblock.patch "
|
||||
|
||||
inherit update-rc.d
|
||||
|
||||
|
|
|
@ -0,0 +1,10 @@
|
|||
--- a/acpid.c
|
||||
+++ b/acpid.c
|
||||
@@ -307,6 +307,7 @@ main(int argc, char **argv)
|
||||
non_root_clients++;
|
||||
}
|
||||
fcntl(cli_fd, F_SETFD, FD_CLOEXEC);
|
||||
+ fcntl(cli_fd, F_SETFL, O_NONBLOCK);
|
||||
snprintf(buf, sizeof(buf)-1, "%d[%d:%d]",
|
||||
creds.pid, creds.uid, creds.gid);
|
||||
acpid_add_client(cli_fd, buf);
|
Loading…
Reference in New Issue