Files
poky/meta/recipes-extended/bash/bash/CVE-2022-3715.patch
Xiangyu Chen 97a5932101 bash: backport patch to fix CVE-2022-3715
CVE Reference: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3715

(From OE-Core rev: 69a52a564f45dafeb65a93a45d3db9c1d178526a)

Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-12-01 19:35:04 +00:00

34 lines
1.1 KiB
Diff

From 15d2428d5d3df8dd826008baf51579ab7750d8b2 Mon Sep 17 00:00:00 2001
From: Xiangyu Chen <xiangyu.chen@windriver.com>
Date: Wed, 23 Nov 2022 11:17:01 +0800
Subject: [OE-Core][kirkstone][PATCH] bash: heap-buffer-overflow in
valid_parameter_transform CVE-2022-3715
Reference:https://bugzilla.redhat.com/show_bug.cgi?id=2126720
CVE: CVE-2022-3715
Upstream-Status: Backport from
[https://git.savannah.gnu.org/cgit/bash.git/diff/subst.c?h=bash-5.2-testing&id=9cef6d01181525de119832d2b6a925899cdec08e]
Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
---
subst.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/subst.c b/subst.c
index 2b76256..38ee9ac 100644
--- a/subst.c
+++ b/subst.c
@@ -7962,7 +7962,7 @@ parameter_brace_transform (varname, value, ind, xform, rtype, quoted, pflags, fl
return ((char *)NULL);
}
- if (valid_parameter_transform (xform) == 0)
+ if (xform[0] == 0 || valid_parameter_transform (xform) == 0)
{
this_command_name = oname;
#if 0 /* TAG: bash-5.2 Martin Schulte <gnu@schrader-schulte.de> 10/2020 */
--
2.34.1