From 76a2d6b83472995edbe967aed80f0fcbb784b3fc Mon Sep 17 00:00:00 2001 From: Khem Raj Date: Fri, 26 Sep 2014 13:21:19 -0700 Subject: bash: Fix CVE-2014-7169 This is a followup patch to incomplete CVE-2014-6271 fix code execution via specially-crafted environment Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed Signed-off-by: Khem Raj Signed-off-by: Richard Purdie --- meta/recipes-extended/bash/bash/cve-2014-7169.patch | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 meta/recipes-extended/bash/bash/cve-2014-7169.patch (limited to 'meta/recipes-extended/bash/bash/cve-2014-7169.patch') diff --git a/meta/recipes-extended/bash/bash/cve-2014-7169.patch b/meta/recipes-extended/bash/bash/cve-2014-7169.patch new file mode 100644 index 0000000000..3c69121767 --- /dev/null +++ b/meta/recipes-extended/bash/bash/cve-2014-7169.patch @@ -0,0 +1,16 @@ +Taken from http://www.openwall.com/lists/oss-security/2016/09/25/10 + +Upstream-Status: Backport +Index: bash-4.3/parse.y +=================================================================== +--- bash-4.3.orig/parse.y 2014-09-26 13:10:44.340080056 -0700 ++++ bash-4.3/parse.y 2014-09-26 13:11:44.764080056 -0700 +@@ -2953,6 +2953,8 @@ + FREE (word_desc_to_read); + word_desc_to_read = (WORD_DESC *)NULL; + ++ eol_ungetc_lookahead = 0; ++ + current_token = '\n'; /* XXX */ + last_read_token = '\n'; + token_to_read = '\n'; -- cgit 1.2.3-korg