diff options
author | Rahul Taya <Rahul.Taya@kpit.com> | 2020-07-30 14:11:51 +0530 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2020-08-12 10:53:51 +0100 |
commit | fb9a4d23c3de9b0140c999322034f8c969e8b1c7 (patch) | |
tree | a3c91fcef429a107edc8ca12ce0a9e4c758e4291 /meta/recipes-support/libpcre/libpcre_8.43.bb | |
parent | 908d6ca32d10ede970343c88480906bc67645931 (diff) | |
download | poky-fb9a4d23c3de9b0140c999322034f8c969e8b1c7.tar.gz |
libpcre: Add fix for CVE-2020-14155
Added below patch in libpcre
CVE-2020-14155.patch
This patch fixes below error:
PCRE could allow a remote attacker to execute arbitrary
code on the system, caused by an integer overflow in
libpcre via a large number after (?C substring.
By sending a request with a large number, an attacker
can execute arbitrary code on the system or
cause the application to crash.
Tested-by: Rahul Taya <Rahul.Taya@kpit.com>
(From OE-Core rev: 3f536edfa56ce3f93223c23ed48427a0c24ede1a)
Signed-off-by: Saloni Jain <Saloni.Jain@kpit.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/libpcre/libpcre_8.43.bb')
-rw-r--r-- | meta/recipes-support/libpcre/libpcre_8.43.bb | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-support/libpcre/libpcre_8.43.bb b/meta/recipes-support/libpcre/libpcre_8.43.bb index b97af08b25..60ece64504 100644 --- a/meta/recipes-support/libpcre/libpcre_8.43.bb +++ b/meta/recipes-support/libpcre/libpcre_8.43.bb | |||
@@ -12,6 +12,7 @@ SRC_URI = "https://ftp.pcre.org/pub/pcre/pcre-${PV}.tar.bz2 \ | |||
12 | file://out-of-tree.patch \ | 12 | file://out-of-tree.patch \ |
13 | file://run-ptest \ | 13 | file://run-ptest \ |
14 | file://Makefile \ | 14 | file://Makefile \ |
15 | file://CVE-2020-14155.patch \ | ||
15 | " | 16 | " |
16 | 17 | ||
17 | SRC_URI[md5sum] = "636222e79e392c3d95dcc545f24f98c4" | 18 | SRC_URI[md5sum] = "636222e79e392c3d95dcc545f24f98c4" |