Bump linux buildroot (#1032)
* Update buildroot to 2020.11-rc3 Signed-off-by: Stefan Agner <stefan@agner.ch> * ODROID: Update kernel 5.9.11 * Remove patch which has been applied upstream * Linux: Update kernel 5.4.80
This commit is contained in:
@@ -0,0 +1,29 @@
|
||||
From 91e2401a219121eae15244a6b25d2e79c1af5864 Mon Sep 17 00:00:00 2001
|
||||
From: Thomas Swan <thomas.swan@gmail.com>
|
||||
Date: Wed, 2 Oct 2013 23:17:17 -0500
|
||||
Subject: [PATCH] CVE-2013-4342: xinetd: ignores user and group directives for
|
||||
TCPMUX services
|
||||
|
||||
Originally reported to Debian in 2005 <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324678> and rediscovered <https://bugzilla.redhat.com/show_bug.cgi?id=1006100>, xinetd would execute TCPMUX services without dropping privilege to match the service configuration allowing the service to run with same privilege as the xinetd process (root).
|
||||
|
||||
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
|
||||
---
|
||||
xinetd/builtins.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/xinetd/builtins.c b/xinetd/builtins.c
|
||||
index 3b85579..34a5bac 100644
|
||||
--- a/xinetd/builtins.c
|
||||
+++ b/xinetd/builtins.c
|
||||
@@ -617,7 +617,7 @@ static void tcpmux_handler( const struct server *serp )
|
||||
if( SC_IS_INTERNAL( scp ) ) {
|
||||
SC_INTERNAL(scp, nserp);
|
||||
} else {
|
||||
- exec_server(nserp);
|
||||
+ child_process(nserp);
|
||||
}
|
||||
}
|
||||
|
||||
--
|
||||
2.20.1
|
||||
|
||||
@@ -9,6 +9,9 @@ XINETD_SITE = $(call github,xinetd-org,xinetd,xinetd-$(XINETD_VERSION))
|
||||
XINETD_LICENSE = xinetd license
|
||||
XINETD_LICENSE_FILES = COPYRIGHT
|
||||
|
||||
# 0005-CVE-2013-4342-xinetd-ignores-user-and-group-directiv.patch
|
||||
XINETD_IGNORE_CVES += CVE-2013-4342
|
||||
|
||||
XINETD_CFLAGS = $(TARGET_CFLAGS)
|
||||
|
||||
# Three cases here:
|
||||
|
||||
Reference in New Issue
Block a user