Copied from Debian. description: out-of-bounds read origin: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6585 --- a/source/layout/LETableReference.h +++ b/source/layout/LETableReference.h @@ -322,7 +322,12 @@ LE_TRACE_TR("INFO: new RTAO") } const T& operator()(le_uint32 i, LEErrorCode &success) const { - return *getAlias(i,success); + const T *ret = getAlias(i,success); + if (LE_FAILURE(success) || ret==NULL) { + return *(new T()); + } else { + return *ret; + } } size_t getOffsetFor(le_uint32 i, LEErrorCode &success) const { ='form'>
Wojtek's customized Guix
aboutsummaryrefslogtreecommitdiff
path: root/gnu/services/dbus.scm
AgeCommit message (Collapse)Author
2021-03-10services: Prevent following symlinks during activation.Maxime Devos
This addresses a potential security issue, where a compromised service could trick the activation code in changing the permissions, owner and group of arbitrary files. However, this patch is currently only a partial fix, due to a TOCTTOU (time-of-check to time-of-use) race, which can be fixed once guile has bindings to openat and friends. Fixes: <https://lists.gnu.org/archive/html/guix-devel/2021-01/msg00388.html> * gnu/build/activation.scm: new procedure 'mkdir-p/perms'. * gnu/services/authentication.scm (%nslcd-activation, nslcd-service-type): use new procedure. * gnu/services/cups.scm (%cups-activation): likewise. * gnu/services/dbus.scm (dbus-activation): likewise. * gnu/services/dns.scm (knot-activation): likewise. Signed-off-by: Ludovic Courtès <ludo@gnu.org>