summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAxel Beckert <abe@deuxchevaux.org>2018-04-07 15:15:39 +0200
committerAxel Beckert <abe@deuxchevaux.org>2018-04-07 15:15:39 +0200
commitb54a7e5506f19208f8109fe90ef5dffd44ef2fad (patch)
treeba9f00a338105e982eadbf060600ca0da0e36899
parent6e1ab9aa550695ee7e3d467b4173c0b83ba7f759 (diff)
downloadzsh-b54a7e5506f19208f8109fe90ef5dffd44ef2fad.tar.gz
zsh-b54a7e5506f19208f8109fe90ef5dffd44ef2fad.zip
Drop cherry-picked patches for CVE-2018-1071 and CVE-2018-1083
-rw-r--r--debian/patches/CVE-2018-1071.patch34
-rw-r--r--debian/patches/CVE-2018-1083.patch37
-rw-r--r--debian/patches/series2
3 files changed, 0 insertions, 73 deletions
diff --git a/debian/patches/CVE-2018-1071.patch b/debian/patches/CVE-2018-1071.patch
deleted file mode 100644
index 89ca5853f..000000000
--- a/debian/patches/CVE-2018-1071.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-Description: CVE-2018-1071
- Check bounds when copying path in hashcmd().
-Origin: 679b71ec4d852037fe5f73d35bf557b0f406c8d4
-Author: Oliver Kiddle <okiddle@yahoo.co.uk>
-Bug-Debian: https://bugs.debian.org/894043
-Bug-CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1083
-
---- a/Src/exec.c
-+++ b/Src/exec.c
-@@ -920,7 +920,7 @@
- for (; *pp; pp++)
- if (**pp == '/') {
- s = buf;
-- strucpy(&s, *pp);
-+ struncpy(&s, *pp, PATH_MAX);
- *s++ = '/';
- if ((s - buf) + strlen(arg0) >= PATH_MAX)
- continue;
---- a/Src/utils.c
-+++ b/Src/utils.c
-@@ -2283,10 +2283,10 @@
- {
- char *u = *s;
-
-- while (n--)
-- *u++ = *t++;
-+ while (n-- && (*u++ = *t++));
- *s = u;
-- *u = '\0';
-+ if (n > 0) /* just one null-byte will do, unlike strncpy(3) */
-+ *u = '\0';
- }
-
- /* Return the number of elements in an array of pointers. *
diff --git a/debian/patches/CVE-2018-1083.patch b/debian/patches/CVE-2018-1083.patch
deleted file mode 100644
index 3e30c3cbd..000000000
--- a/debian/patches/CVE-2018-1083.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-Description: CVE-2018-1083
- Check bounds on PATH_MAX-sized buffer used for file completion
- candidates.
-Origin: 259ac472eac291c8c103c7a0d8a4eaf3c2942ed7
-Author: Oliver Kiddle <okiddle@yahoo.co.uk>
-Bug-Debian: https://bugs.debian.org/894043
-Bug-CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1083
-
---- a/Src/Zle/compctl.c
-+++ b/Src/Zle/compctl.c
-@@ -2176,6 +2176,8 @@ gen_matches_files(int dirs, int execs, int all)
- if (prpre && *prpre) {
- pathpref = dupstring(prpre);
- unmetafy(pathpref, &pathpreflen);
-+ if (pathpreflen > PATH_MAX)
-+ return;
- /* system needs NULL termination, not provided by unmetafy */
- pathpref[pathpreflen] = '\0';
- } else {
-@@ -2218,6 +2220,8 @@ gen_matches_files(int dirs, int execs, int all)
- * the path buffer by appending the filename. */
- ums = dupstring(n);
- unmetafy(ums, &umlen);
-+ if (umlen + pathpreflen + 1 > PATH_MAX)
-+ continue;
- memcpy(q, ums, umlen);
- q[umlen] = '\0';
- /* And do the stat. */
-@@ -2232,6 +2236,8 @@ gen_matches_files(int dirs, int execs, int all)
- /* We have to test for a path suffix. */
- int o = strlen(p), tt;
-
-+ if (o + strlen(psuf) > PATH_MAX)
-+ continue;
- /* Append it to the path buffer. */
- strcpy(p + o, psuf);
-
diff --git a/debian/patches/series b/debian/patches/series
index d05bc6244..cb6fdacc2 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1,4 +1,2 @@
further-mitigate-test-suite-hangs.patch
update-debian-sections.patch
-CVE-2018-1071.patch
-CVE-2018-1083.patch