]> code.ossystems Code Review - openembedded-core.git/commit
perl: CVE-2018-6798
authorJagadeesh Krishnanjanappa <jkrishnanjanappa@mvista.com>
Wed, 22 Aug 2018 11:41:43 +0000 (17:11 +0530)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 29 Aug 2018 14:22:28 +0000 (15:22 +0100)
commit4aaf09b9d657b1c2df85bf509008beacd6a00342
tree2d1ce281e788df4f0ee89efb8ec9aedd37c06c2e
parenta11c8ee86007f7f7a34b9dc29d01acc323b71873
perl: CVE-2018-6798

* CVE-2018-6798-1
 The proximal cause is several instances in regexec.c of the code
 assuming that the input was valid UTF-8, whereas the input was too short
 for what the start byte claimed it would be.

 I grepped through the core for any other similar uses, and did not find
 any.

 (cherry picked from commit fe7d8ba0a1bf567af8fa8fea128e2b9f4c553e84)

* CVE-2018-6798-2
 The first patch for 132063 prevented the buffer read overflow when
 dumping the warning but didn't fix the underlying problem.

 The next change treats the supplied buffer correctly, preventing the
 non-UTF-8 SV from being treated as UTF-8, preventing the warning.

 (cherry picked from commit 1e8b61488f195e1396aa801c685340b156104f4f)

Affects perl >= 5.22 && perl <= 5.26

Signed-off-by: Jagadeesh Krishnanjanappa <jkrishnanjanappa@mvista.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-devtools/perl/perl/CVE-2018-6798-1.patch [new file with mode: 0644]
meta/recipes-devtools/perl/perl/CVE-2018-6798-2.patch [new file with mode: 0644]
meta/recipes-devtools/perl/perl_5.24.1.bb