xref: /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/bash/bash/CVE-2022-3715.patch (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1From 15d2428d5d3df8dd826008baf51579ab7750d8b2 Mon Sep 17 00:00:00 2001
2From: Xiangyu Chen <xiangyu.chen@windriver.com>
3Date: Wed, 23 Nov 2022 11:17:01 +0800
4Subject: [OE-Core][kirkstone][PATCH] bash: heap-buffer-overflow in
5 valid_parameter_transform CVE-2022-3715
6
7Reference:https://bugzilla.redhat.com/show_bug.cgi?id=2126720
8
9CVE: CVE-2022-3715
10Upstream-Status: Backport from
11[https://git.savannah.gnu.org/cgit/bash.git/diff/subst.c?h=bash-5.2-testing&id=9cef6d01181525de119832d2b6a925899cdec08e]
12
13Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
14---
15 subst.c | 2 +-
16 1 file changed, 1 insertion(+), 1 deletion(-)
17
18diff --git a/subst.c b/subst.c
19index 2b76256..38ee9ac 100644
20--- a/subst.c
21+++ b/subst.c
22@@ -7962,7 +7962,7 @@ parameter_brace_transform (varname, value, ind, xform, rtype, quoted, pflags, fl
23       return ((char *)NULL);
24     }
25
26-  if (valid_parameter_transform (xform) == 0)
27+  if (xform[0] == 0 || valid_parameter_transform (xform) == 0)
28     {
29       this_command_name = oname;
30 #if 0 /* TAG: bash-5.2 Martin Schulte <gnu@schrader-schulte.de> 10/2020 */
31--
322.34.1
33
34