summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/libpcre/libpcre_8.43.bb
diff options
context:
space:
mode:
authorRahul Taya <Rahul.Taya@kpit.com>2020-07-30 14:11:51 +0530
committerAnuj Mittal <anuj.mittal@intel.com>2020-08-10 08:52:49 +0800
commit3f536edfa56ce3f93223c23ed48427a0c24ede1a (patch)
tree055935b7789fe6d0409f3bef5dc69b78565fbcf6 /meta/recipes-support/libpcre/libpcre_8.43.bb
parent0e8526ce8694ebd6988c3804e4d2ccf39cda90c7 (diff)
downloadopenembedded-core-contrib-3f536edfa56ce3f93223c23ed48427a0c24ede1a.tar.gz
libpcre: Add fix for CVE-2020-14155stable/zeus-next
Added below patch in libpcre CVE-2020-14155.patch This patch fixes below error: PCRE could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in libpcre via a large number after (?C substring. By sending a request with a large number, an attacker can execute arbitrary code on the system or cause the application to crash. Tested-by: Rahul Taya <Rahul.Taya@kpit.com> Signed-off-by: Saloni Jain <Saloni.Jain@kpit.com> Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Diffstat (limited to 'meta/recipes-support/libpcre/libpcre_8.43.bb')
-rw-r--r--meta/recipes-support/libpcre/libpcre_8.43.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-support/libpcre/libpcre_8.43.bb b/meta/recipes-support/libpcre/libpcre_8.43.bb
index b97af08b25..60ece64504 100644
--- a/meta/recipes-support/libpcre/libpcre_8.43.bb
+++ b/meta/recipes-support/libpcre/libpcre_8.43.bb
@@ -12,6 +12,7 @@ SRC_URI = "https://ftp.pcre.org/pub/pcre/pcre-${PV}.tar.bz2 \
file://out-of-tree.patch \
file://run-ptest \
file://Makefile \
+ file://CVE-2020-14155.patch \
"
SRC_URI[md5sum] = "636222e79e392c3d95dcc545f24f98c4"