xref: /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/unzip/unzip/CVE-2015-7696.patch (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1Upstream-Status: Backport
2CVE: CVE-2015-7696
3Signed-off-by: Tudor Florea <tudor.flore@enea.com>
4
5From 68efed87fabddd450c08f3112f62a73f61d493c9 Mon Sep 17 00:00:00 2001
6From: Petr Stodulka <pstodulk@redhat.com>
7Date: Mon, 14 Sep 2015 18:23:17 +0200
8Subject: [PATCH 1/2] upstream fix for heap overflow
9
10https://bugzilla.redhat.com/attachment.cgi?id=1073002
11---
12 crypt.c | 12 +++++++++++-
13 1 file changed, 11 insertions(+), 1 deletion(-)
14
15diff --git a/crypt.c b/crypt.c
16index 784e411..a8975f2 100644
17--- a/crypt.c
18+++ b/crypt.c
19@@ -465,7 +465,17 @@ int decrypt(__G__ passwrd)
20     GLOBAL(pInfo->encrypted) = FALSE;
21     defer_leftover_input(__G);
22     for (n = 0; n < RAND_HEAD_LEN; n++) {
23-        b = NEXTBYTE;
24+        /* 2012-11-23 SMS.  (OUSPG report.)
25+         * Quit early if compressed size < HEAD_LEN.  The resulting
26+         * error message ("unable to get password") could be improved,
27+         * but it's better than trying to read nonexistent data, and
28+         * then continuing with a negative G.csize.  (See
29+         * fileio.c:readbyte()).
30+         */
31+        if ((b = NEXTBYTE) == (ush)EOF)
32+        {
33+            return PK_ERR;
34+        }
35         h[n] = (uch)b;
36         Trace((stdout, " (%02x)", h[n]));
37     }
38--
392.4.6
40