On Wed, Jul 29, 2020 at 5:56 AM Saloni Jain <saloni.j...@kpit.com> wrote: > > From: Rahul Taya <rahul.t...@kpit.com> > > Added below patch in libpcre > CVE-2020-14155.patch > > This patch fixes below error: > PCRE could allow a remote attacker to execute arbitrary > code on the system, caused by an integer overflow in > libpcre via a large number after (?C substring. > By sending a request with a large number, an attacker > can execute arbitrary code on the system or > cause the application to crash. > > Upstream-Status: Pending
you don't need this here. its needed in package patch header which you already have secondly do we need this on master and dunfell ? > > Tested-by: Rahul Taya <rahul.t...@kpit.com> > Signed-off-by: Saloni Jain <saloni.j...@kpit.com> > --- > .../libpcre/libpcre/CVE-2020-14155.patch | 40 > ++++++++++++++++++++++ > meta/recipes-support/libpcre/libpcre_8.44.bb | 3 +- > 2 files changed, 42 insertions(+), 1 deletion(-) > create mode 100644 meta/recipes-support/libpcre/libpcre/CVE-2020-14155.patch > > diff --git a/meta/recipes-support/libpcre/libpcre/CVE-2020-14155.patch > b/meta/recipes-support/libpcre/libpcre/CVE-2020-14155.patch > new file mode 100644 > index 0000000..d6cb9bf > --- /dev/null > +++ b/meta/recipes-support/libpcre/libpcre/CVE-2020-14155.patch > @@ -0,0 +1,40 @@ > +--- pcre-8.43/pcre_compile.c 2020-07-05 22:26:25.310501521 +0530 > ++++ pcre-8.43/pcre_compile1.c 2020-07-05 22:30:22.254489562 +0530 > + > +CVE: CVE-2020-14155 > +Upstream-Status: Backport > [https://vcs.pcre.org/pcre/code/trunk/pcre_compile.c?view=patch&r1=1761&r2=1760&pathrev=1761] > + > +@@ -6,7 +6,7 @@ > + and semantics are as close as possible to those of the Perl 5 language. > + > + Written by Philip Hazel > +- Copyright (c) 1997-2018 University of Cambridge > ++ Copyright (c) 1997-2020 University of Cambridge > + > + > ----------------------------------------------------------------------------- > + Redistribution and use in source and binary forms, with or without > +@@ -7130,17 +7130,19 @@ > + int n = 0; > + ptr++; > + while(IS_DIGIT(*ptr)) > ++ { > + n = n * 10 + *ptr++ - CHAR_0; > ++ if (n > 255) > ++ { > ++ *errorcodeptr = ERR38; > ++ goto FAILED; > ++ } > ++ } > + if (*ptr != CHAR_RIGHT_PARENTHESIS) > + { > + *errorcodeptr = ERR39; > + goto FAILED; > + } > +- if (n > 255) > +- { > +- *errorcodeptr = ERR38; > +- goto FAILED; > +- } > + *code++ = n; > + PUT(code, 0, (int)(ptr - cd->start_pattern + 1)); /* Pattern > offset */ > + PUT(code, LINK_SIZE, 0); /* Default > length */ > diff --git a/meta/recipes-support/libpcre/libpcre_8.44.bb > b/meta/recipes-support/libpcre/libpcre_8.44.bb > index e5471e8..81b38bb 100644 > --- a/meta/recipes-support/libpcre/libpcre_8.44.bb > +++ b/meta/recipes-support/libpcre/libpcre_8.44.bb > @@ -11,7 +11,8 @@ SRC_URI = "https://ftp.pcre.org/pub/pcre/pcre-${PV}.tar.bz2 > \ > file://fix-pcre-name-collision.patch \ > file://run-ptest \ > file://Makefile \ > - " > + file://CVE-2020-14155.patch \ > +" > > SRC_URI[md5sum] = "cf7326204cc46c755b5b2608033d9d24" > SRC_URI[sha256sum] = > "19108658b23b3ec5058edc9f66ac545ea19f9537234be1ec62b714c84399366d" > -- > 2.7.4 > > This message contains information that may be privileged or confidential and > is the property of the KPIT Technologies Ltd. It is intended only for the > person to whom it is addressed. If you are not the intended recipient, you > are not authorized to read, print, retain copy, disseminate, distribute, or > use this message or any part thereof. If you receive this message in error, > please notify the sender immediately and delete all copies of this message. > KPIT Technologies Ltd. does not accept any liability for virus infected mails.
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#141100): https://lists.openembedded.org/g/openembedded-core/message/141100 Mute This Topic: https://lists.openembedded.org/mt/75863890/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-