17ba24bac1
Add backported patches for the following four security issues in libarchive. There is no new release yet including these patches. - CVE-2018-1000877 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000877) "libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive." - CVE-2018-1000878 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000878) "libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive." - CVE-2018-1000879 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000879) "libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file." - CVE-2018-1000880 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000880) "libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file." Signed-off-by: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
47 lines
1.5 KiB
Diff
47 lines
1.5 KiB
Diff
From 9c84b7426660c09c18cc349f6d70b5f8168b5680 Mon Sep 17 00:00:00 2001
|
|
From: Daniel Axtens <dja@axtens.net>
|
|
Date: Tue, 4 Dec 2018 16:33:42 +1100
|
|
Subject: [PATCH] warc: consume data once read
|
|
|
|
The warc decoder only used read ahead, it wouldn't actually consume
|
|
data that had previously been printed. This means that if you specify
|
|
an invalid content length, it will just reprint the same data over
|
|
and over and over again until it hits the desired length.
|
|
|
|
This means that a WARC resource with e.g.
|
|
Content-Length: 666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666665
|
|
but only a few hundred bytes of data, causes a quasi-infinite loop.
|
|
|
|
Consume data in subsequent calls to _warc_read.
|
|
|
|
Found with an AFL + afl-rb + qsym setup.
|
|
---
|
|
libarchive/archive_read_support_format_warc.c | 5 +++++
|
|
1 file changed, 5 insertions(+)
|
|
|
|
[for import into Buildroot]
|
|
Signed-off-by: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com>
|
|
Upstream-status: backport
|
|
|
|
CVE-2018-1000880
|
|
|
|
diff --git a/libarchive/archive_read_support_format_warc.c b/libarchive/archive_read_support_format_warc.c
|
|
index e8753853..e8fc8428 100644
|
|
--- a/libarchive/archive_read_support_format_warc.c
|
|
+++ b/libarchive/archive_read_support_format_warc.c
|
|
@@ -386,6 +386,11 @@ _warc_read(struct archive_read *a, const void **buf, size_t *bsz, int64_t *off)
|
|
return (ARCHIVE_EOF);
|
|
}
|
|
|
|
+ if (w->unconsumed) {
|
|
+ __archive_read_consume(a, w->unconsumed);
|
|
+ w->unconsumed = 0U;
|
|
+ }
|
|
+
|
|
rab = __archive_read_ahead(a, 1U, &nrd);
|
|
if (nrd < 0) {
|
|
*bsz = 0U;
|
|
--
|
|
2.19.2
|
|
|