summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/perl/perl-5.20.0/perl-5.14.3-fix-CVE-2010-4777.patch
diff options
context:
space:
mode:
authorRobert Yang <liezhi.yang@windriver.com>2015-06-17 00:19:42 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2015-07-01 15:39:58 +0100
commit3f7e55baa6b65b39c5698bb58320f85876cebe23 (patch)
tree398e48b0e167f958d084ce1e8ccf25162ac9f0a8 /meta/recipes-devtools/perl/perl-5.20.0/perl-5.14.3-fix-CVE-2010-4777.patch
parenta01d406f6b0d9e08ce6d7408c2928a433fdf1843 (diff)
downloadpoky-3f7e55baa6b65b39c5698bb58320f85876cebe23.tar.gz
perl: 5.20.0 -> 5.22.0
* Remove: - perl-5.14.3-fix-CVE-2010-4777.patch: backport - fix-FF_MORE-crash.patch: backport - perl-rprovides.inc: it was introduced by 5.8.7, the lines in it are like: RPROVIDES_perl-module-b-asmdata = "perl-module-${TARGET_SYS}-b-asmdata" If some packages do RPDEND on something like perl-module-${TARGET_SYS}-b-asmdatam, we need update the package rather than keep use RPROVIDES in perl-rprovides.inc, so remove it. - perl-rprovides_5.20.0.inc: it only has one line: RPROVIDES_perl-module-module-build, but the perl-module-module-build is gone in 5.22.0, so remove it. * Update: - debian patches from http://ftp.de.debian.org/debian/pool/main/p/perl/perl_5.20.0-1.debian.tar.xz - Makefile.SH.patch - Merge 0001-Makefile.SH-fix-do_install-failed.patch into Makefile.SH.patch - native-nopacklist.patch - config.sh * The CGI.pm and Module::Build disappear from core, so no perl-module-module-build.rpm any more, more info: http://perltricks.com/article/165/2015/4/10/A-preview-of-Perl-5-22 (From OE-Core rev: 06d43a90acbe63baea62d220659149a3ff2f9198) Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/perl/perl-5.20.0/perl-5.14.3-fix-CVE-2010-4777.patch')
-rw-r--r--meta/recipes-devtools/perl/perl-5.20.0/perl-5.14.3-fix-CVE-2010-4777.patch45
1 files changed, 0 insertions, 45 deletions
diff --git a/meta/recipes-devtools/perl/perl-5.20.0/perl-5.14.3-fix-CVE-2010-4777.patch b/meta/recipes-devtools/perl/perl-5.20.0/perl-5.14.3-fix-CVE-2010-4777.patch
deleted file mode 100644
index e0dcf412bb..0000000000
--- a/meta/recipes-devtools/perl/perl-5.20.0/perl-5.14.3-fix-CVE-2010-4777.patch
+++ /dev/null
@@ -1,45 +0,0 @@
1perl:fix for CVE-2010-4777
2
3Upstream-Status: Backport
4
5The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0,
65.14.0, and other versions, when running with debugging enabled,
7allows context-dependent attackers to cause a denial of service
8(assertion failure and application exit) via crafted input that
9is not properly handled when using certain regular expressions,
10as demonstrated by causing SpamAssassin and OCSInventory to
11crash.
12
13http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4777
14
15Signed-off-by: yanjun.zhu <yanjun.zhu@windriver.com>
16--- a/regcomp.c
17+++ b/regcomp.c
18@@ -11868,8 +11868,25 @@ Perl_save_re_context(pTHX)
19
20 if (gvp) {
21 GV * const gv = *gvp;
22- if (SvTYPE(gv) == SVt_PVGV && GvSV(gv))
23- save_scalar(gv);
24+ if (SvTYPE(gv) == SVt_PVGV && GvSV(gv)) {
25+ /* this is a copy of save_scalar() without the GETMAGIC call, RT#76538 */
26+ SV ** const sptr = &GvSVn(gv);
27+ SV * osv = *sptr;
28+ SV * nsv = newSV(0);
29+ save_pushptrptr(SvREFCNT_inc_simple(gv),
30+ SvREFCNT_inc(osv), SAVEt_SV);
31+ if (SvTYPE(osv) >= SVt_PVMG && SvMAGIC(osv) &&
32+ SvTYPE(osv) != SVt_PVGV) {
33+ if (SvGMAGICAL(osv)) {
34+ const bool oldtainted = PL_tainted;
35+ SvFLAGS(osv) |= (SvFLAGS(osv) &
36+ (SVp_IOK|SVp_NOK|SVp_POK)) >> PRIVSHIFT;
37+ PL_tainted = oldtainted;
38+ }
39+ mg_localize(osv, nsv, 1);
40+ }
41+ *sptr = nsv;
42+ }
43 }
44 }
45 }