]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commitdiff
busybox: fix CVE-2022-30065
authorRoss Burton <ross.burton@arm.com>
Tue, 28 Jun 2022 13:29:34 +0000 (14:29 +0100)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 1 Jul 2022 10:30:49 +0000 (11:30 +0100)
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-core/busybox/busybox/CVE-2022-30065.patch [new file with mode: 0644]
meta/recipes-core/busybox/busybox_1.35.0.bb

diff --git a/meta/recipes-core/busybox/busybox/CVE-2022-30065.patch b/meta/recipes-core/busybox/busybox/CVE-2022-30065.patch
new file mode 100644 (file)
index 0000000..25ad653
--- /dev/null
@@ -0,0 +1,29 @@
+Fix use-after-free in awk.
+
+CVE: CVE-2022-30065
+Upstream-Status: Submitted [http://lists.busybox.net/pipermail/busybox/2022-June/089768.html]
+Signed-off-by: Ross Burton <ross.burton@arm.com>
+
+fixes https://bugs.busybox.net/show_bug.cgi?id=14781
+
+Signed-off-by: Natanael Copa <ncopa at alpinelinux.org>
+---
+ editors/awk.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/editors/awk.c b/editors/awk.c
+index 079d0bde5..728ee8685 100644
+--- a/editors/awk.c
++++ b/editors/awk.c
+@@ -3128,6 +3128,9 @@ static var *evaluate(node *op, var *res)
+               case XC( OC_MOVE ):
+                       debug_printf_eval("MOVE\n");
++                      /* make sure that we never return a temp var */
++                      if (L.v == TMPVAR0)
++                              L.v = res;
+                       /* if source is a temporary string, jusk relink it to dest */
+                       if (R.v == TMPVAR1
+                        && !(R.v->type & VF_NUMBER)
+-- 
+2.36.1
index f2f1b35902dd38af4b044527f517355c7e28d54f..edf896485ec8a9c0c162c0a5d91ee3414d4a04eb 100644 (file)
@@ -49,6 +49,7 @@ SRC_URI = "https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \
            file://0001-sysctl-ignore-EIO-of-stable_secret-below-proc-sys-ne.patch \
            file://0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch \
            file://0002-nslookup-sanitize-all-printed-strings-with-printable.patch \
+           file://CVE-2022-30065.patch \
            "
 SRC_URI:append:libc-musl = " file://musl.cfg "