Fix CVE-2014-8118 (integer overflow allowing arbitrary remote code execution via crafted CPIO header). https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118 Source: https://bugzilla.redhat.com/attachment.cgi?id=962159&action=diff Adopted by Debian: http://anonscm.debian.org/cgit/collab-maint/rpm.git/plain/debian/patches/CVE-2014-8118.patch diff --git a/lib/cpio.c b/lib/cpio.c index 253ff0f..600633a 100644 --- a/lib/cpio.c +++ b/lib/cpio.c @@ -399,6 +399,9 @@ int rpmcpioHeaderRead(rpmcpio_t cpio, char ** path, int * fx) GET_NUM_FIELD(hdr.filesize, fsize); GET_NUM_FIELD(hdr.namesize, nameSize); + if (nameSize <= 0 || nameSize > 4096) { + return RPMERR_BAD_HEADER; + } char name[nameSize + 1]; read = Fread(name, nameSize, 1, cpio->fd); value='koszko-scripts'>koszko-scripts Wojtek's customized Guix
aboutsummaryrefslogtreecommitdiff
path: root/gnu/artwork.scm
AgeCommit message (Expand)Author
2019-06-10artwork: Update snapshot to 2f2fe74....* gnu/artwork.scm (%artwork-repository): Update to 2f2fe74. Signed-off-by: Ludovic Courtès <ludo@gnu.org> Diego Nicola Barbato
2019-03-05artwork: Update snapshot to b975164....* gnu/artwork.scm (%artwork-repository): Update to b975164. Ludovic Courtès
2019-02-10artwork: Update snapshot to e951905....* gnu/artwork.scm (%artwork-repository): Update to e951905. Ludovic Courtès
2018-11-05artwork: Clone over HTTPS....Suggested by Leo Famulari <leo@famulari.name> at <https://lists.gnu.org/archive/html/help-guix/2018-11/msg00039.html>. * gnu/artwork.scm (%artwork-repository): Switch to HTTPS URL. Ludovic Courtès