summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorVivek Kumbhar <vkumbhar@mvista.com>2023-04-21 08:20:12 +0530
committerSteve Sakoman <steve@sakoman.com>2023-04-26 04:03:21 -1000
commitc34e0e1e0f9c22b519817cd07f1c6662445d275c (patch)
tree701c4db55b7967210e1403d14d5fdca911c391fc
parentd19f7ddf5a54625dc500eee8baeddb792795c754 (diff)
downloadpoky-c34e0e1e0f9c22b519817cd07f1c6662445d275c.tar.gz
go: fix CVE-2023-24537 Infinite loop in parsing
Setting a large line or column number using a //line directive can cause integer overflow even in small source files. Limit line and column numbers in //line directives to 2^30-1, which is small enough to avoid int32 overflow on all reasonbly-sized files. Fixes CVE-2023-24537 Fixes #59273 For #59180 (From OE-Core rev: 15c07dff384ce4fb0e90f4f32c182a82101a1c82) Signed-off-by: Vivek Kumbhar <vkumbhar@mvista.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-devtools/go/go-1.17.13.inc1
-rw-r--r--meta/recipes-devtools/go/go-1.18/CVE-2023-24537.patch75
2 files changed, 76 insertions, 0 deletions
diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc
index 34d58aec2f..cda9227042 100644
--- a/meta/recipes-devtools/go/go-1.17.13.inc
+++ b/meta/recipes-devtools/go/go-1.17.13.inc
@@ -27,6 +27,7 @@ SRC_URI += "\
27 file://add_godebug.patch \ 27 file://add_godebug.patch \
28 file://cve-2022-41725.patch \ 28 file://cve-2022-41725.patch \
29 file://CVE-2022-41722.patch \ 29 file://CVE-2022-41722.patch \
30 file://CVE-2023-24537.patch \
30" 31"
31SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" 32SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd"
32 33
diff --git a/meta/recipes-devtools/go/go-1.18/CVE-2023-24537.patch b/meta/recipes-devtools/go/go-1.18/CVE-2023-24537.patch
new file mode 100644
index 0000000000..4521f159ea
--- /dev/null
+++ b/meta/recipes-devtools/go/go-1.18/CVE-2023-24537.patch
@@ -0,0 +1,75 @@
1From bf8c7c575c8a552d9d79deb29e80854dc88528d0 Mon Sep 17 00:00:00 2001
2From: Damien Neil <dneil@google.com>
3Date: Mon, 20 Mar 2023 10:43:19 -0700
4Subject: [PATCH] [release-branch.go1.20] mime/multipart: limit parsed mime
5 message sizes
6
7Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1802456
8Reviewed-by: Julie Qiu <julieqiu@google.com>
9Reviewed-by: Roland Shoemaker <bracewell@google.com>
10Run-TryBot: Damien Neil <dneil@google.com>
11Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1802611
12Reviewed-by: Damien Neil <dneil@google.com>
13Change-Id: Ifdfa192d54f722d781a4d8c5f35b5fb72d122168
14Reviewed-on: https://go-review.googlesource.com/c/go/+/481986
15Reviewed-by: Matthew Dempsky <mdempsky@google.com>
16TryBot-Result: Gopher Robot <gobot@golang.org>
17Run-TryBot: Michael Knyszek <mknyszek@google.com>
18Auto-Submit: Michael Knyszek <mknyszek@google.com>
19
20Upstream-Status: Backport [https://github.com/golang/go/commit/126a1d02da82f93ede7ce0bd8d3c51ef627f2104]
21CVE: CVE-2023-24537
22Signed-off-by: Vivek Kumbhar <vkumbhar@mvista.com>
23---
24 src/go/parser/parser_test.go | 16 ++++++++++++++++
25 src/go/scanner/scanner.go | 5 ++++-
26 2 files changed, 20 insertions(+), 1 deletion(-)
27
28diff --git a/src/go/parser/parser_test.go b/src/go/parser/parser_test.go
29index 1a46c87..993df63 100644
30--- a/src/go/parser/parser_test.go
31+++ b/src/go/parser/parser_test.go
32@@ -746,3 +746,19 @@ func TestScopeDepthLimit(t *testing.T) {
33 }
34 }
35 }
36+
37+// TestIssue59180 tests that line number overflow doesn't cause an infinite loop.
38+func TestIssue59180(t *testing.T) {
39+ testcases := []string{
40+ "package p\n//line :9223372036854775806\n\n//",
41+ "package p\n//line :1:9223372036854775806\n\n//",
42+ "package p\n//line file:9223372036854775806\n\n//",
43+ }
44+
45+ for _, src := range testcases {
46+ _, err := ParseFile(token.NewFileSet(), "", src, ParseComments)
47+ if err == nil {
48+ t.Errorf("ParseFile(%s) succeeded unexpectedly", src)
49+ }
50+ }
51+}
52diff --git a/src/go/scanner/scanner.go b/src/go/scanner/scanner.go
53index f08e28c..ff847b5 100644
54--- a/src/go/scanner/scanner.go
55+++ b/src/go/scanner/scanner.go
56@@ -251,13 +251,16 @@ func (s *Scanner) updateLineInfo(next, offs int, text []byte) {
57 return
58 }
59
60+ // Put a cap on the maximum size of line and column numbers.
61+ // 30 bits allows for some additional space before wrapping an int32.
62+ const maxLineCol = 1<<30 - 1
63 var line, col int
64 i2, n2, ok2 := trailingDigits(text[:i-1])
65 if ok2 {
66 //line filename:line:col
67 i, i2 = i2, i
68 line, col = n2, n
69- if col == 0 {
70+ if col == 0 || col > maxLineCol {
71 s.error(offs+i2, "invalid column number: "+string(text[i2:]))
72 return
73 }
74--
752.25.1