rpms/tar/F-7 tar-1.15.1-safer_name_suffix.patch, NONE, 1.1 tar.spec, 1.59, 1.60
Radek Brich (rbrich)
fedora-extras-commits at redhat.com
Wed Oct 24 12:43:02 UTC 2007
Author: rbrich
Update of /cvs/extras/rpms/tar/F-7
In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv27953
Modified Files:
tar.spec
Added Files:
tar-1.15.1-safer_name_suffix.patch
Log Message:
CVE-2007-4476
tar-1.15.1-safer_name_suffix.patch:
--- NEW FILE tar-1.15.1-safer_name_suffix.patch ---
diff -up tar-1.15.1/src/names.c.safer_name_suffix tar-1.15.1/src/names.c
--- tar-1.15.1/src/names.c.safer_name_suffix 2007-10-22 16:21:20.000000000 +0200
+++ tar-1.15.1/src/names.c 2007-10-22 16:23:45.000000000 +0200
@@ -958,15 +958,27 @@ hash_string_compare (void const *name1,
return strcmp (name1, name2) == 0;
}
-/* Return zero if TABLE contains a copy of STRING; otherwise, insert a
- copy of STRING to TABLE and return 1. */
+/* Return zero if TABLE contains a LEN-character long prefix of STRING,
+ otherwise, insert a newly allocated copy of this prefix to TABLE and
+ return 1. If RETURN_PREFIX is not NULL, point it to the allocated
+ copy. */
static bool
-hash_string_insert (Hash_table **table, char const *string)
+hash_string_insert_prefix (Hash_table **table, char const *string, size_t len,
+ const char **return_prefix)
{
Hash_table *t = *table;
- char *s = xstrdup (string);
+ char *s;
char *e;
+ if (len)
+ {
+ s = xmalloc (len + 1);
+ memcpy (s, string, len);
+ s[len] = 0;
+ }
+ else
+ s = xstrdup (string);
+
if (! ((t
|| (*table = t = hash_initialize (0, 0, hash_string_hasher,
hash_string_compare, 0)))
@@ -974,7 +986,11 @@ hash_string_insert (Hash_table **table,
xalloc_die ();
if (e == s)
- return 1;
+ {
+ if (return_prefix)
+ *return_prefix = s;
+ return 1;
+ }
else
{
free (s);
@@ -982,6 +998,14 @@ hash_string_insert (Hash_table **table,
}
}
+/* Return zero if TABLE contains a copy of STRING; otherwise, insert a
+ copy of STRING to TABLE and return 1. */
+bool
+hash_string_insert (Hash_table **table, char const *string)
+{
+ return hash_string_insert_prefix (table, string, 0, NULL);
+}
+
/* Return 1 if TABLE contains STRING. */
static bool
hash_string_lookup (Hash_table const *table, char const *string)
@@ -1082,11 +1106,9 @@ safer_name_suffix (char const *file_name
if (prefix_len)
{
- char *prefix = alloca (prefix_len + 1);
- memcpy (prefix, file_name, prefix_len);
- prefix[prefix_len] = '\0';
-
- if (hash_string_insert (&prefix_table[link_target], prefix))
+ const char *prefix;
+ if (hash_string_insert_prefix (&prefix_table[link_target], file_name,
+ prefix_len, &prefix))
{
static char const *const diagnostic[] =
{
Index: tar.spec
===================================================================
RCS file: /cvs/extras/rpms/tar/F-7/tar.spec,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -r1.59 -r1.60
--- tar.spec 28 Aug 2007 11:25:27 -0000 1.59
+++ tar.spec 24 Oct 2007 12:42:23 -0000 1.60
@@ -2,7 +2,7 @@
Name: tar
Epoch: 2
Version: 1.15.1
-Release: 27%{?dist}
+Release: 28%{?dist}
License: GPL
Group: Applications/Archiving
URL: http://www.gnu.org/software/tar/
@@ -26,6 +26,7 @@
Patch15: tar-1.15.1-xattrs.patch
Patch16: tar-1.15.1-mangling.patch
Patch17: tar-1.15.1-dot_dot_vuln.patch
+Patch18: tar-1.15.1-safer_name_suffix.patch
Prereq: info
BuildRequires: autoconf automake gzip
Buildroot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
@@ -63,6 +64,7 @@
%patch15 -p1 -b .xattrs
%patch16 -p1 -b .mangling
%patch17 -p1 -b .dot_dot_vuln
+%patch18 -p1 -b .safer_name_suffix
%build
%configure --bindir=/bin --libexecdir=/sbin
@@ -113,6 +115,10 @@
%{_infodir}/tar.info*
%changelog
+* Wed Oct 24 2007 Radek Brich <rbrich at redhat.com> 2:1.15.1-28
+- backported upstream patch for CVE-2007-4476
+ (tar stack crashing in safer_name_suffix)
+
* Tue Aug 28 2007 Radek Brich <rbrich at redhat.com> 2:1.15.1-27
- fixed CVE-2007-4131 tar directory traversal vulnerability (#253684)
More information about the fedora-extras-commits
mailing list