https://bugzilla.redhat.com/show_bug.cgi?id=1741472 0006-Fix-buffer-overrun-in-inotifytools.c.patch Fix buffer overrun on -c|--csv with '"', ',' or '\n' in directory name. 0005-Fix-segfault-with-csv-output-when-filename-contains-.patch Remove rpath to pass a rpmbuild check.epel9
parent
957f105215
commit
57853162fd
@ -0,0 +1,24 @@
|
||||
From: Dmitry Bogatov <KAction@gnu.org>
|
||||
Date: Sat, 4 Mar 2017 21:13:38 +0300
|
||||
Subject: [PATCH] Fix segfault with csv output when filename contains comma
|
||||
|
||||
Double `csv_escape()'ing filename is logic error, but root of the
|
||||
problem was that passing `csv' buffer back into `csv_escape()' caused
|
||||
endless loop over `static char csv[MAXLEN]', and buffer overflow.
|
||||
---
|
||||
src/inotifywait.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/src/inotifywait.c b/src/inotifywait.c
|
||||
index 98aadd4..6e17007 100644
|
||||
--- a/src/inotifywait.c
|
||||
+++ b/src/inotifywait.c
|
||||
@@ -119,7 +119,7 @@ void validate_format( char * fmt ) {
|
||||
void output_event_csv( struct inotify_event * event ) {
|
||||
char *filename = csv_escape(inotifytools_filename_from_wd(event->wd));
|
||||
if (filename != NULL)
|
||||
- printf("%s,", csv_escape(filename));
|
||||
+ printf("%s,", filename);
|
||||
|
||||
printf("%s,", csv_escape( inotifytools_event_to_str( event->mask ) ) );
|
||||
if ( event->len > 0 )
|
@ -0,0 +1,33 @@
|
||||
From: Dmitry Bogatov <KAction@debian.org>
|
||||
Date: Tue, 6 Aug 2019 16:36:24 +0000
|
||||
Subject: Fix buffer overrun in inotifytools.c
|
||||
|
||||
The following code
|
||||
|
||||
char *names[2+sizeof(int)/sizeof(char*)];
|
||||
|
||||
was supposed to allocate enough space on stack to fit two `char *' and one
|
||||
`int'. Problem is that when sizeof(int) < sizeof(char *), which is likely on
|
||||
64-bit systems, it caused expression `sizeof(int)/sizeof(char*)' evaluate to 0,
|
||||
resulting in buffer overrun.
|
||||
|
||||
Detected by GCC-9 new diagnostics.
|
||||
|
||||
Closes: #925717
|
||||
---
|
||||
libinotifytools/src/inotifytools.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/libinotifytools/src/inotifytools.c b/libinotifytools/src/inotifytools.c
|
||||
index b3feca3..ce4ccd5 100644
|
||||
--- a/libinotifytools/src/inotifytools.c
|
||||
+++ b/libinotifytools/src/inotifytools.c
|
||||
@@ -859,7 +859,7 @@ void inotifytools_set_filename_by_filename( char const * oldname,
|
||||
void inotifytools_replace_filename( char const * oldname,
|
||||
char const * newname ) {
|
||||
if ( !oldname || !newname ) return;
|
||||
- char *names[2+sizeof(int)/sizeof(char*)];
|
||||
+ char *names[2+sizeof(int)/sizeof(char*) + 1];
|
||||
names[0] = (char*)oldname;
|
||||
names[1] = (char*)newname;
|
||||
*((int*)&names[2]) = strlen(oldname);
|
Loading…
Reference in new issue