Buildroot Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH 1/1] package/unzip: update security and bux fix patches from Debian
@ 2019-07-12 13:30 Sébastien Szymanski
  2019-07-14 13:04 ` Thomas Petazzoni
  2019-07-31 22:02 ` Peter Korsgaard
  0 siblings, 2 replies; 3+ messages in thread
From: Sébastien Szymanski @ 2019-07-12 13:30 UTC (permalink / raw)
  To: buildroot

Fix the URL and add three new patches. Quoting changelog [1]:

unzip (6.0-24) unstable; urgency=medium

  * Apply two patches by Mark Adler:
  - Fix bug in undefer_input() that misplaced the input state.
  - Detect and reject a zip bomb using overlapped entries. Closes: #931433.
    Bug discovered by David Fifield. For reference, this is CVE-2019-13232.

 -- Santiago Vila <sanvila@debian.org>  Thu, 11 Jul 2019 18:03:34 +0200

unzip (6.0-23) unstable; urgency=medium

  * Fix lame code in fileio.c which parsed 64-bit values incorrectly.
    Thanks to David Fifield for the report. Closes: #929502.

 -- Santiago Vila <sanvila@debian.org>  Wed, 29 May 2019 00:24:08 +0200

[1] https://sources.debian.org/data/main/u/unzip/6.0-24/debian/changelog

Signed-off-by: S?bastien Szymanski <sebastien.szymanski@armadeus.com>
---
 package/unzip/unzip.hash |  3 +++
 package/unzip/unzip.mk   | 29 ++++++++++++++++-------------
 2 files changed, 19 insertions(+), 13 deletions(-)

diff --git a/package/unzip/unzip.hash b/package/unzip/unzip.hash
index fbf2615ad6..0c384d006e 100644
--- a/package/unzip/unzip.hash
+++ b/package/unzip/unzip.hash
@@ -13,3 +13,6 @@ sha256 ea04cfc8b7ca3b3c03117da0d891870b8c542d26188ef5593fd7e479f4f29f4e 17-resto
 sha256 1872ffdd4d82edd7b1e62c469642bf16a1ca12dd26d41bd3f0b44f0f7602eb63 18-cve-2014-9913-unzip-buffer-overflow.patch
 sha256 60840ea8f5d11a276972fb5b43652cdd49a9ed93b2cc0586ad309bf52104b012 19-cve-2016-9844-zipinfo-buffer-overflow.patch
 sha256 4eabc3faeddd56ebc3d5053486b61f8758d840902725fd555d3472cffb094437 20-cve-2018-1000035-unzip-buffer-overflow.patch
+sha256 df3b0eeea8dcc161a2565e306b5dda13d27de43145e198baaf0eab822321ee7e 21-fix-warning-messages-on-big-files.patch
+sha256 2cf5a89e921da99e883bcde0ea03e2c77ae9185f57efaf35e7d43bc24353cfdc 22-cve-2019-13232-fix-bug-in-undefer-input.patch
+sha256 c8e82c80fc7760f90567118a465e4cfa1b8e5d0a5723f9c70e3d21247e550615 23-cve-2019-13232-zip-bomb-with-overlapped-entries.patch
diff --git a/package/unzip/unzip.mk b/package/unzip/unzip.mk
index 43e90125e6..2887b7b288 100644
--- a/package/unzip/unzip.mk
+++ b/package/unzip/unzip.mk
@@ -11,18 +11,21 @@ UNZIP_LICENSE = Info-ZIP
 UNZIP_LICENSE_FILES = LICENSE
 
 UNZIP_PATCH = \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/07-increase-size-of-cfactorstr.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/08-allow-greater-hostver-values.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/09-cve-2014-8139-crc-overflow.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/10-cve-2014-8140-test-compr-eb.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/11-cve-2014-8141-getzip64data.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/12-cve-2014-9636-test-compr-eb.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/14-cve-2015-7696.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/15-cve-2015-7697.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/16-fix-integer-underflow-csiz-decrypted.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/17-restore-unix-timestamps-accurately.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/18-cve-2014-9913-unzip-buffer-overflow.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/19-cve-2016-9844-zipinfo-buffer-overflow.patch \
-	https://sources.debian.org/data/main/u/unzip/6.0-22/debian/patches/20-cve-2018-1000035-unzip-buffer-overflow.patch
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/07-increase-size-of-cfactorstr.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/08-allow-greater-hostver-values.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/09-cve-2014-8139-crc-overflow.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/10-cve-2014-8140-test-compr-eb.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/11-cve-2014-8141-getzip64data.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/12-cve-2014-9636-test-compr-eb.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/14-cve-2015-7696.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/15-cve-2015-7697.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/16-fix-integer-underflow-csiz-decrypted.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/17-restore-unix-timestamps-accurately.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/18-cve-2014-9913-unzip-buffer-overflow.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/19-cve-2016-9844-zipinfo-buffer-overflow.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/20-cve-2018-1000035-unzip-buffer-overflow.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/21-fix-warning-messages-on-big-files.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/22-cve-2019-13232-fix-bug-in-undefer-input.patch \
+	https://sources.debian.org/data/main/u/unzip/6.0-24/debian/patches/23-cve-2019-13232-zip-bomb-with-overlapped-entries.patch
 
 $(eval $(cmake-package))
-- 
2.21.0

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [Buildroot] [PATCH 1/1] package/unzip: update security and bux fix patches from Debian
  2019-07-12 13:30 [Buildroot] [PATCH 1/1] package/unzip: update security and bux fix patches from Debian Sébastien Szymanski
@ 2019-07-14 13:04 ` Thomas Petazzoni
  2019-07-31 22:02 ` Peter Korsgaard
  1 sibling, 0 replies; 3+ messages in thread
From: Thomas Petazzoni @ 2019-07-14 13:04 UTC (permalink / raw)
  To: buildroot

On Fri, 12 Jul 2019 15:30:41 +0200
S?bastien Szymanski <sebastien.szymanski@armadeus.com> wrote:

> Fix the URL and add three new patches. Quoting changelog [1]:
> 
> unzip (6.0-24) unstable; urgency=medium
> 
>   * Apply two patches by Mark Adler:
>   - Fix bug in undefer_input() that misplaced the input state.
>   - Detect and reject a zip bomb using overlapped entries. Closes: #931433.
>     Bug discovered by David Fifield. For reference, this is CVE-2019-13232.
> 
>  -- Santiago Vila <sanvila@debian.org>  Thu, 11 Jul 2019 18:03:34 +0200
> 
> unzip (6.0-23) unstable; urgency=medium
> 
>   * Fix lame code in fileio.c which parsed 64-bit values incorrectly.
>     Thanks to David Fifield for the report. Closes: #929502.
> 
>  -- Santiago Vila <sanvila@debian.org>  Wed, 29 May 2019 00:24:08 +0200
> 
> [1] https://sources.debian.org/data/main/u/unzip/6.0-24/debian/changelog
> 
> Signed-off-by: S?bastien Szymanski <sebastien.szymanski@armadeus.com>
> ---
>  package/unzip/unzip.hash |  3 +++
>  package/unzip/unzip.mk   | 29 ++++++++++++++++-------------
>  2 files changed, 19 insertions(+), 13 deletions(-)

Applied to master, thanks.

Thomas
-- 
Thomas Petazzoni, CTO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Buildroot] [PATCH 1/1] package/unzip: update security and bux fix patches from Debian
  2019-07-12 13:30 [Buildroot] [PATCH 1/1] package/unzip: update security and bux fix patches from Debian Sébastien Szymanski
  2019-07-14 13:04 ` Thomas Petazzoni
@ 2019-07-31 22:02 ` Peter Korsgaard
  1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2019-07-31 22:02 UTC (permalink / raw)
  To: buildroot

>>>>> "S?bastien" == S?bastien Szymanski <sebastien.szymanski@armadeus.com> writes:

 > Fix the URL and add three new patches. Quoting changelog [1]:
 > unzip (6.0-24) unstable; urgency=medium

 >   * Apply two patches by Mark Adler:
 >   - Fix bug in undefer_input() that misplaced the input state.
 >   - Detect and reject a zip bomb using overlapped entries. Closes: #931433.
 >     Bug discovered by David Fifield. For reference, this is CVE-2019-13232.

 >  -- Santiago Vila <sanvila@debian.org>  Thu, 11 Jul 2019 18:03:34 +0200

 > unzip (6.0-23) unstable; urgency=medium

 >   * Fix lame code in fileio.c which parsed 64-bit values incorrectly.
 >     Thanks to David Fifield for the report. Closes: #929502.

 >  -- Santiago Vila <sanvila@debian.org>  Wed, 29 May 2019 00:24:08 +0200

 > [1] https://sources.debian.org/data/main/u/unzip/6.0-24/debian/changelog

 > Signed-off-by: S?bastien Szymanski <sebastien.szymanski@armadeus.com>

Committed to 2019.02.x and 2019.05.x, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-07-31 22:02 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-07-12 13:30 [Buildroot] [PATCH 1/1] package/unzip: update security and bux fix patches from Debian Sébastien Szymanski
2019-07-14 13:04 ` Thomas Petazzoni
2019-07-31 22:02 ` Peter Korsgaard

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox