diff options
author | Michał Górny <mgorny@gentoo.org> | 2018-01-02 14:11:57 +0100 |
---|---|---|
committer | Michał Górny <mgorny@gentoo.org> | 2018-01-02 14:12:52 +0100 |
commit | cae6e3b2949cd42743ab916a3e64d45aadd1a983 (patch) | |
tree | b9875690f76e5fa70ac05c5dd85c2871935d3e60 /app-arch/libarchive/files | |
parent | sys-fs/e2fsprogs: Bump to version 1.43.8 (diff) | |
download | gentoo-cae6e3b2949cd42743ab916a3e64d45aadd1a983.tar.gz gentoo-cae6e3b2949cd42743ab916a3e64d45aadd1a983.tar.bz2 gentoo-cae6e3b2949cd42743ab916a3e64d45aadd1a983.zip |
app-arch/libarchive: Clean old up
Diffstat (limited to 'app-arch/libarchive/files')
-rw-r--r-- | app-arch/libarchive/files/CVE-2017-5601.patch | 24 |
1 files changed, 0 insertions, 24 deletions
diff --git a/app-arch/libarchive/files/CVE-2017-5601.patch b/app-arch/libarchive/files/CVE-2017-5601.patch deleted file mode 100644 index 4ba85ff9072f..000000000000 --- a/app-arch/libarchive/files/CVE-2017-5601.patch +++ /dev/null @@ -1,24 +0,0 @@ -From 98dcbbf0bf4854bf987557e55e55fff7abbf3ea9 Mon Sep 17 00:00:00 2001 -From: Martin Matuska <martin@matuska.org> -Date: Thu, 19 Jan 2017 22:00:18 +0100 -Subject: [PATCH] Fail with negative lha->compsize in lha_read_file_header_1() - Fixes a heap buffer overflow reported in Secunia SA74169 - ---- - libarchive/archive_read_support_format_lha.c | 3 +++ - 1 file changed, 3 insertions(+) - -diff --git a/libarchive/archive_read_support_format_lha.c b/libarchive/archive_read_support_format_lha.c -index 52a5531..d77a7c2 100644 ---- a/libarchive/archive_read_support_format_lha.c -+++ b/libarchive/archive_read_support_format_lha.c -@@ -924,6 +924,9 @@ lha_read_file_header_1(struct archive_read *a, struct lha *lha) - /* Get a real compressed file size. */ - lha->compsize -= extdsize - 2; - -+ if (lha->compsize < 0) -+ goto invalid; /* Invalid compressed file size */ -+ - if (sum_calculated != headersum) { - archive_set_error(&a->archive, ARCHIVE_ERRNO_MISC, - "LHa header sum error"); |