xref: /OK3568_Linux_fs/yocto/poky/meta/recipes-core/busybox/busybox/CVE-2022-30065.patch (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1Fix use-after-free in awk.
2
3CVE: CVE-2022-30065
4Upstream-Status: Submitted [http://lists.busybox.net/pipermail/busybox/2022-June/089768.html]
5Signed-off-by: Ross Burton <ross.burton@arm.com>
6
7fixes https://bugs.busybox.net/show_bug.cgi?id=14781
8
9Signed-off-by: Natanael Copa <ncopa at alpinelinux.org>
10---
11 editors/awk.c | 3 +++
12 1 file changed, 3 insertions(+)
13
14diff --git a/editors/awk.c b/editors/awk.c
15index 079d0bde5..728ee8685 100644
16--- a/editors/awk.c
17+++ b/editors/awk.c
18@@ -3128,6 +3128,9 @@ static var *evaluate(node *op, var *res)
19
20 		case XC( OC_MOVE ):
21 			debug_printf_eval("MOVE\n");
22+			/* make sure that we never return a temp var */
23+			if (L.v == TMPVAR0)
24+				L.v = res;
25 			/* if source is a temporary string, jusk relink it to dest */
26 			if (R.v == TMPVAR1
27 			 && !(R.v->type & VF_NUMBER)
28--
292.36.1
30