From 897a7d56795337a31a690916937b2fee60f45829 Mon Sep 17 00:00:00 2001 From: Scott Murray Date: Wed, 30 Dec 2020 17:44:18 -0500 Subject: patch: fix CVE-2019-20633 * CVE detail: https://nvd.nist.gov/vuln/detail/CVE-2019-20633 * upstream tracking: https://savannah.gnu.org/bugs/index.php?56683 * Fixes potential for double free after incomplete fix for CVE-2018-6952 - src/pch.c (another_hunk): Avoid invalid memory access in context format diffs. (From OE-Core rev: be71dd2cc16a4c0d244a76a748f08ca0d9bfeba0) Signed-off-by: Scott Murray Signed-off-by: Richard Purdie --- meta/recipes-devtools/patch/patch_2.7.6.bb | 1 + 1 file changed, 1 insertion(+) (limited to 'meta/recipes-devtools/patch/patch_2.7.6.bb') diff --git a/meta/recipes-devtools/patch/patch_2.7.6.bb b/meta/recipes-devtools/patch/patch_2.7.6.bb index b5897b357a..1997af0c25 100644 --- a/meta/recipes-devtools/patch/patch_2.7.6.bb +++ b/meta/recipes-devtools/patch/patch_2.7.6.bb @@ -10,6 +10,7 @@ SRC_URI += "file://0001-Unset-need_charset_alias-when-building-for-musl.patch \ file://0001-Invoke-ed-directly-instead-of-using-the-shell.patch \ file://0001-Don-t-leak-temporary-file-on-failed-ed-style-patch.patch \ file://0001-Don-t-leak-temporary-file-on-failed-multi-file-ed.patch \ + file://CVE-2019-20633.patch \ " SRC_URI[md5sum] = "4c68cee989d83c87b00a3860bcd05600" -- cgit v1.2.3-54-g00ecf