diff options
| -rw-r--r-- | meta/recipes-devtools/patch/patch/CVE-2019-20633.patch | 31 | ||||
| -rw-r--r-- | meta/recipes-devtools/patch/patch_2.7.6.bb | 1 |
2 files changed, 32 insertions, 0 deletions
diff --git a/meta/recipes-devtools/patch/patch/CVE-2019-20633.patch b/meta/recipes-devtools/patch/patch/CVE-2019-20633.patch new file mode 100644 index 0000000000..03988a179c --- /dev/null +++ b/meta/recipes-devtools/patch/patch/CVE-2019-20633.patch | |||
| @@ -0,0 +1,31 @@ | |||
| 1 | From 15b158db3ae11cb835f2eb8d2eb48e09d1a4af48 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Andreas Gruenbacher <agruen@gnu.org> | ||
| 3 | Date: Mon, 15 Jul 2019 19:10:02 +0200 | ||
| 4 | Subject: Avoid invalid memory access in context format diffs | ||
| 5 | |||
| 6 | * src/pch.c (another_hunk): Avoid invalid memory access in context format | ||
| 7 | diffs. | ||
| 8 | |||
| 9 | CVE: CVE-2019-20633 | ||
| 10 | Upstream-Status: Backport[https://git.savannah.gnu.org/cgit/patch.git/patch/?id=15b158db3ae11cb835f2eb8d2eb48e09d1a4af48] | ||
| 11 | Signed-off-by: Scott Murray <scott.murray@konsulko.com> | ||
| 12 | |||
| 13 | --- | ||
| 14 | src/pch.c | 1 + | ||
| 15 | 1 file changed, 1 insertion(+) | ||
| 16 | |||
| 17 | diff --git a/src/pch.c b/src/pch.c | ||
| 18 | index a500ad9..cb54e03 100644 | ||
| 19 | --- a/src/pch.c | ||
| 20 | +++ b/src/pch.c | ||
| 21 | @@ -1328,6 +1328,7 @@ another_hunk (enum diff difftype, bool rev) | ||
| 22 | ptrn_prefix_context = context; | ||
| 23 | ptrn_suffix_context = context; | ||
| 24 | if (repl_beginning | ||
| 25 | + || p_end <= 0 | ||
| 26 | || (p_end | ||
| 27 | != p_ptrn_lines + 1 + (p_Char[p_end - 1] == '\n'))) | ||
| 28 | { | ||
| 29 | -- | ||
| 30 | cgit v1.2.1 | ||
| 31 | |||
diff --git a/meta/recipes-devtools/patch/patch_2.7.6.bb b/meta/recipes-devtools/patch/patch_2.7.6.bb index b5897b357a..1997af0c25 100644 --- a/meta/recipes-devtools/patch/patch_2.7.6.bb +++ b/meta/recipes-devtools/patch/patch_2.7.6.bb | |||
| @@ -10,6 +10,7 @@ SRC_URI += "file://0001-Unset-need_charset_alias-when-building-for-musl.patch \ | |||
| 10 | file://0001-Invoke-ed-directly-instead-of-using-the-shell.patch \ | 10 | file://0001-Invoke-ed-directly-instead-of-using-the-shell.patch \ |
| 11 | file://0001-Don-t-leak-temporary-file-on-failed-ed-style-patch.patch \ | 11 | file://0001-Don-t-leak-temporary-file-on-failed-ed-style-patch.patch \ |
| 12 | file://0001-Don-t-leak-temporary-file-on-failed-multi-file-ed.patch \ | 12 | file://0001-Don-t-leak-temporary-file-on-failed-multi-file-ed.patch \ |
| 13 | file://CVE-2019-20633.patch \ | ||
| 13 | " | 14 | " |
| 14 | 15 | ||
| 15 | SRC_URI[md5sum] = "4c68cee989d83c87b00a3860bcd05600" | 16 | SRC_URI[md5sum] = "4c68cee989d83c87b00a3860bcd05600" |
