3bd38b4eca
Fixes CVE-2014-9680 - A user with sudo access may be able to exploit parsing bugs in the time zone parsing functions of the system's C library functions. The user may also be able to read arbitrary files, potentially causing changes in system behavior when reading certain device special files or simply causing the program run via sudo to block. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
21 lines
856 B
Diff
21 lines
856 B
Diff
signame.c uses sudo_compat.h which in turn uses gid_t definitions
|
|
that are normally defined in unistd.h.
|
|
This doesn't seem to cause issues with (e)glibc systems, but it does break
|
|
uClibc-based builds.
|
|
|
|
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
|
|
|
|
diff -Nura sudo-1.8.12.orig/lib/util/mksigname.c sudo-1.8.12/lib/util/mksigname.c
|
|
--- sudo-1.8.12.orig/lib/util/mksigname.c 2015-02-09 15:40:10.000000000 -0300
|
|
+++ sudo-1.8.12/lib/util/mksigname.c 2015-02-17 09:20:05.126701093 -0300
|
|
@@ -44,6 +44,9 @@
|
|
|
|
printf("#include <config.h>\n");
|
|
printf("#include <signal.h>\n");
|
|
+ printf("#ifdef HAVE_UNISTD_H\n");
|
|
+ printf("#include <unistd.h>\n");
|
|
+ printf("#endif /* HAVE_UNISTD_H */\n");
|
|
printf("#include \"sudo_compat.h\"\n\n");
|
|
printf("const char *const sudo_sys_signame[NSIG] = {\n");
|
|
for (i = 0; i < NSIG; i++) {
|