CVE num upstream commit openEuler patch CVE-2023-29400 9db0e74f606b8afb28cc71d4b1c8b4ed24cabbf5 0016-release-branch.go1.19-html-template-emit-filterFails.patch CVE-2023-24540 ce7bd33345416e6d8cac901792060591cafc2797 0015-release-branch.go1.19-html-template-handle-all-JS-wh.patch CVE-2023-24539 e49282327b05192e46086bf25fd3ac691205fe80 0014-release-branch.go1.19-html-template-disallow-angle-b.patch CVE-2023-24538 b1e3ecfa06b67014429a197ec5e134ce4303ad9b 0013-release-branch.go1.19-html-template-disallow-actions.patch CVE-2023-24537 126a1d02da82f93ede7ce0bd8d3c51ef627f2104 0012-release-branch.go1.19-go-scanner-reject-large-line-a.patch CVE-2023-24536 7917b5f31204528ea72e0629f0b7d52b35b27538 0011-release-branch.go1.19-mime-multipart-limit-parsed-mi.patch CVE-2023-24536 7a359a651c7ebdb29e0a1c03102fce793e9f58f0 0010-release-branch.go1.19-net-textproto-mime-multipart-i.patch CVE-2023-24536 ef41a4e2face45e580c5836eaebd51629fc23f15 0009-release-branch.go1.19-mime-multipart-avoid-excessive.patch CVE-2023-24534 d6759e7a059f4208f07aa781402841d7ddaaef96 0008-release-branch.go1.19-net-textproto-avoid-overpredic.patch CVE-2023-24532 639b67ed114151c0d786aa26e7faeab942400703 0007-release-branch.go1.19-crypto-internal-nistec-reduce-.patch CVE-2022-41723 5c3e11bd0b5c0a86e5beffcd4339b86a902b21c3 0006-release-branch.go1.19-net-http-update-bundled-golang.patch CVE-2022-41724 00b256e9e3c0fa02a278ec9dfc3e191e02ceaf80 0005-release-branch.go1.19-crypto-tls-replace-all-usages-.patch CVE-2022-41725 5c55ac9bf1e5f779220294c843526536605f42ab 0004-release-branch.go1.19-mime-multipart-limit-memory-in.patch CVE-2022-41722 3345ddca41f00f9ed6fc3c1a36f6e2bede02d7ff 0003-release-branch.go1.19-path-filepath-do-not-Clean-a-..patch Signed-off-by: zhangzhihui <zhangzhihui@xfusion.com>
92 lines
3.0 KiB
Diff
92 lines
3.0 KiB
Diff
From 126a1d02da82f93ede7ce0bd8d3c51ef627f2104 Mon Sep 17 00:00:00 2001
|
|
From: Damien Neil <dneil@google.com>
|
|
Date: Wed, 22 Mar 2023 09:33:22 -0700
|
|
Subject: [PATCH] [release-branch.go1.19] go/scanner: reject large line and
|
|
column numbers in //line directives
|
|
|
|
Setting a large line or column number using a //line directive can cause
|
|
integer overflow even in small source files.
|
|
|
|
Limit line and column numbers in //line directives to 2^30-1, which
|
|
is small enough to avoid int32 overflow on all reasonbly-sized files.
|
|
|
|
Fixes CVE-2023-24537
|
|
Fixes #59273
|
|
For #59180
|
|
|
|
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1802456
|
|
Reviewed-by: Julie Qiu <julieqiu@google.com>
|
|
Reviewed-by: Roland Shoemaker <bracewell@google.com>
|
|
Run-TryBot: Damien Neil <dneil@google.com>
|
|
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1802611
|
|
Reviewed-by: Damien Neil <dneil@google.com>
|
|
Change-Id: Ifdfa192d54f722d781a4d8c5f35b5fb72d122168
|
|
Reviewed-on: https://go-review.googlesource.com/c/go/+/481986
|
|
Reviewed-by: Matthew Dempsky <mdempsky@google.com>
|
|
TryBot-Result: Gopher Robot <gobot@golang.org>
|
|
Run-TryBot: Michael Knyszek <mknyszek@google.com>
|
|
Auto-Submit: Michael Knyszek <mknyszek@google.com>
|
|
---
|
|
src/go/parser/parser_test.go | 16 ++++++++++++++++
|
|
src/go/scanner/scanner.go | 7 +++++--
|
|
2 files changed, 21 insertions(+), 2 deletions(-)
|
|
|
|
diff --git a/src/go/parser/parser_test.go b/src/go/parser/parser_test.go
|
|
index 0c278924c9..15b265ffc3 100644
|
|
--- a/src/go/parser/parser_test.go
|
|
+++ b/src/go/parser/parser_test.go
|
|
@@ -742,3 +742,19 @@ func TestScopeDepthLimit(t *testing.T) {
|
|
}
|
|
}
|
|
}
|
|
+
|
|
+// TestIssue59180 tests that line number overflow doesn't cause an infinite loop.
|
|
+func TestIssue59180(t *testing.T) {
|
|
+ testcases := []string{
|
|
+ "package p\n//line :9223372036854775806\n\n//",
|
|
+ "package p\n//line :1:9223372036854775806\n\n//",
|
|
+ "package p\n//line file:9223372036854775806\n\n//",
|
|
+ }
|
|
+
|
|
+ for _, src := range testcases {
|
|
+ _, err := ParseFile(token.NewFileSet(), "", src, ParseComments)
|
|
+ if err == nil {
|
|
+ t.Errorf("ParseFile(%s) succeeded unexpectedly", src)
|
|
+ }
|
|
+ }
|
|
+}
|
|
diff --git a/src/go/scanner/scanner.go b/src/go/scanner/scanner.go
|
|
index 07e07581f7..6a7e30bb2f 100644
|
|
--- a/src/go/scanner/scanner.go
|
|
+++ b/src/go/scanner/scanner.go
|
|
@@ -246,13 +246,16 @@ func (s *Scanner) updateLineInfo(next, offs int, text []byte) {
|
|
return
|
|
}
|
|
|
|
+ // Put a cap on the maximum size of line and column numbers.
|
|
+ // 30 bits allows for some additional space before wrapping an int32.
|
|
+ const maxLineCol = 1<<30 - 1
|
|
var line, col int
|
|
i2, n2, ok2 := trailingDigits(text[:i-1])
|
|
if ok2 {
|
|
//line filename:line:col
|
|
i, i2 = i2, i
|
|
line, col = n2, n
|
|
- if col == 0 {
|
|
+ if col == 0 || col > maxLineCol {
|
|
s.error(offs+i2, "invalid column number: "+string(text[i2:]))
|
|
return
|
|
}
|
|
@@ -262,7 +265,7 @@ func (s *Scanner) updateLineInfo(next, offs int, text []byte) {
|
|
line = n
|
|
}
|
|
|
|
- if line == 0 {
|
|
+ if line == 0 || line > maxLineCol {
|
|
s.error(offs+i, "invalid line number: "+string(text[i:]))
|
|
return
|
|
}
|
|
--
|
|
2.37.1
|
|
|