summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorXiangyu Chen <xiangyu.chen@eng.windriver.com>2022-11-23 11:44:04 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-12-01 19:35:04 +0000
commit97a593210126ffc2c5ffe3961e17c9810a66742a (patch)
treed9a0899100e60db438325be2585c35481c06f324 /meta
parentc505f3539d34c7527c00f1c9d93fed2c2d17bb27 (diff)
downloadpoky-97a593210126ffc2c5ffe3961e17c9810a66742a.tar.gz
bash: backport patch to fix CVE-2022-3715
CVE Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3715 (From OE-Core rev: 69a52a564f45dafeb65a93a45d3db9c1d178526a) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-extended/bash/bash/CVE-2022-3715.patch33
-rw-r--r--meta/recipes-extended/bash/bash_5.1.16.bb1
2 files changed, 34 insertions, 0 deletions
diff --git a/meta/recipes-extended/bash/bash/CVE-2022-3715.patch b/meta/recipes-extended/bash/bash/CVE-2022-3715.patch
new file mode 100644
index 0000000000..44f4d91949
--- /dev/null
+++ b/meta/recipes-extended/bash/bash/CVE-2022-3715.patch
@@ -0,0 +1,33 @@
1From 15d2428d5d3df8dd826008baf51579ab7750d8b2 Mon Sep 17 00:00:00 2001
2From: Xiangyu Chen <xiangyu.chen@windriver.com>
3Date: Wed, 23 Nov 2022 11:17:01 +0800
4Subject: [OE-Core][kirkstone][PATCH] bash: heap-buffer-overflow in
5 valid_parameter_transform CVE-2022-3715
6
7Reference:https://bugzilla.redhat.com/show_bug.cgi?id=2126720
8
9CVE: CVE-2022-3715
10Upstream-Status: Backport from
11[https://git.savannah.gnu.org/cgit/bash.git/diff/subst.c?h=bash-5.2-testing&id=9cef6d01181525de119832d2b6a925899cdec08e]
12
13Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
14---
15 subst.c | 2 +-
16 1 file changed, 1 insertion(+), 1 deletion(-)
17
18diff --git a/subst.c b/subst.c
19index 2b76256..38ee9ac 100644
20--- a/subst.c
21+++ b/subst.c
22@@ -7962,7 +7962,7 @@ parameter_brace_transform (varname, value, ind, xform, rtype, quoted, pflags, fl
23 return ((char *)NULL);
24 }
25
26- if (valid_parameter_transform (xform) == 0)
27+ if (xform[0] == 0 || valid_parameter_transform (xform) == 0)
28 {
29 this_command_name = oname;
30 #if 0 /* TAG: bash-5.2 Martin Schulte <gnu@schrader-schulte.de> 10/2020 */
31--
322.34.1
33
diff --git a/meta/recipes-extended/bash/bash_5.1.16.bb b/meta/recipes-extended/bash/bash_5.1.16.bb
index d046faa4e5..11c2314fbf 100644
--- a/meta/recipes-extended/bash/bash_5.1.16.bb
+++ b/meta/recipes-extended/bash/bash_5.1.16.bb
@@ -15,6 +15,7 @@ SRC_URI = "${GNU_MIRROR}/bash/${BP}.tar.gz;name=tarball \
15 file://use_aclocal.patch \ 15 file://use_aclocal.patch \
16 file://makerace.patch \ 16 file://makerace.patch \
17 file://makerace2.patch \ 17 file://makerace2.patch \
18 file://CVE-2022-3715.patch \
18 " 19 "
19 20
20SRC_URI[tarball.sha256sum] = "5bac17218d3911834520dad13cd1f85ab944e1c09ae1aba55906be1f8192f558" 21SRC_URI[tarball.sha256sum] = "5bac17218d3911834520dad13cd1f85ab944e1c09ae1aba55906be1f8192f558"