Non-exhaustively fixes CVE-2016-9844, CVE-2018-1000035, CVE-2018-18384, and CVE-2019-13232. * gnu/packages/patches/unzip-COVSCAN-fix-unterminated-string.patch, gnu/packages/patches/unzip-CVE-2016-9844.patch, gnu/packages/patches/unzip-CVE-2018-1000035.patch, gnu/packages/patches/unzip-CVE-2018-18384.patch, gnu/packages/patches/unzip-case-insensitive.patch, gnu/packages/patches/unzip-alt-iconv-utf8-print.patch, gnu/packages/patches/unzip-alt-iconv-utf8.patch, gnu/packages/patches/unzip-close.patch, gnu/packages/patches/unzip-exec-shield.patch, gnu/packages/patches/unzip-fix-recmatch.patch, gnu/packages/patches/unzip-manpage-fix.patch, gnu/packages/patches/unzip-overflow.patch, gnu/packages/patches/unzip-symlink.patch, gnu/packages/patches/unzip-timestamp.patch, gnu/packages/patches/unzip-valgrind.patch, gnu/packages/patches/unzip-x-option.patch, gnu/packages/patches/unzip-zipbomb-manpage.patch, gnu/packages/patches/unzip-zipbomb-part1.patch, gnu/packages/patches/unzip-zipbomb-part2.patch, gnu/packages/patches/unzip-zipbomb-part3.patch: New patches. * gnu/local.mk (dist_patch_DATA): Register them. * gnu/packages/compression.scm (unzip/fixed): New variable. Apply patches. (unzip)[replacement]: Graft.
		
			
				
	
	
		
			112 lines
		
	
	
	
		
			5.1 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			112 lines
		
	
	
	
		
			5.1 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
| From 6d351831be705cc26d897db44f878a978f4138fc Mon Sep 17 00:00:00 2001
 | |
| From: Mark Adler <madler@alumni.caltech.edu>
 | |
| Date: Thu, 25 Jul 2019 20:43:17 -0700
 | |
| Subject: [PATCH] Do not raise a zip bomb alert for a misplaced central
 | |
|  directory.
 | |
| 
 | |
| There is a zip-like file in the Firefox distribution, omni.ja,
 | |
| which is a zip container with the central directory placed at the
 | |
| start of the file instead of after the local entries as required
 | |
| by the zip standard. This commit marks the actual location of the
 | |
| central directory, as well as the end of central directory records,
 | |
| as disallowed locations. This now permits such containers to not
 | |
| raise a zip bomb alert, where in fact there are no overlaps.
 | |
| ---
 | |
|  extract.c | 25 +++++++++++++++++++------
 | |
|  process.c |  6 ++++++
 | |
|  unzpriv.h | 10 ++++++++++
 | |
|  3 files changed, 35 insertions(+), 6 deletions(-)
 | |
| 
 | |
| diff --git a/extract.c b/extract.c
 | |
| index 0973a33..1b73cb0 100644
 | |
| --- a/extract.c
 | |
| +++ b/extract.c
 | |
| @@ -493,8 +493,11 @@ int extract_or_test_files(__G)    /* return PK-type error code */
 | |
|      }
 | |
|  #endif /* !SFX || SFX_EXDIR */
 | |
|  
 | |
| -    /* One more: initialize cover structure for bomb detection. Start with a
 | |
| -       span that covers the central directory though the end of the file. */
 | |
| +    /* One more: initialize cover structure for bomb detection. Start with
 | |
| +       spans that cover any extra bytes at the start, the central directory,
 | |
| +       the end of central directory record (including the Zip64 end of central
 | |
| +       directory locator, if present), and the Zip64 end of central directory
 | |
| +       record, if present. */
 | |
|      if (G.cover == NULL) {
 | |
|          G.cover = malloc(sizeof(cover_t));
 | |
|          if (G.cover == NULL) {
 | |
| @@ -506,15 +509,25 @@ int extract_or_test_files(__G)    /* return PK-type error code */
 | |
|          ((cover_t *)G.cover)->max = 0;
 | |
|      }
 | |
|      ((cover_t *)G.cover)->num = 0;
 | |
| -    if ((G.extra_bytes != 0 &&
 | |
| -         cover_add((cover_t *)G.cover, 0, G.extra_bytes) != 0) ||
 | |
| -        cover_add((cover_t *)G.cover,
 | |
| +    if (cover_add((cover_t *)G.cover,
 | |
|                    G.extra_bytes + G.ecrec.offset_start_central_directory,
 | |
| -                  G.ziplen) != 0) {
 | |
| +                  G.extra_bytes + G.ecrec.offset_start_central_directory +
 | |
| +                  G.ecrec.size_central_directory) != 0) {
 | |
|          Info(slide, 0x401, ((char *)slide,
 | |
|            LoadFarString(NotEnoughMemCover)));
 | |
|          return PK_MEM;
 | |
|      }
 | |
| +    if ((G.extra_bytes != 0 &&
 | |
| +         cover_add((cover_t *)G.cover, 0, G.extra_bytes) != 0) ||
 | |
| +        (G.ecrec.have_ecr64 &&
 | |
| +         cover_add((cover_t *)G.cover, G.ecrec.ec64_start,
 | |
| +                   G.ecrec.ec64_end) != 0) ||
 | |
| +        cover_add((cover_t *)G.cover, G.ecrec.ec_start,
 | |
| +                  G.ecrec.ec_end) != 0) {
 | |
| +        Info(slide, 0x401, ((char *)slide,
 | |
| +          LoadFarString(OverlappedComponents)));
 | |
| +        return PK_BOMB;
 | |
| +    }
 | |
|  
 | |
|  /*---------------------------------------------------------------------------
 | |
|      The basic idea of this function is as follows.  Since the central di-
 | |
| diff --git a/process.c b/process.c
 | |
| index d2e4dc3..d75d405 100644
 | |
| --- a/process.c
 | |
| +++ b/process.c
 | |
| @@ -1408,6 +1408,10 @@ static int find_ecrec64(__G__ searchlen)         /* return PK-class error */
 | |
|  
 | |
|      /* Now, we are (almost) sure that we have a Zip64 archive. */
 | |
|      G.ecrec.have_ecr64 = 1;
 | |
| +    G.ecrec.ec_start -= ECLOC64_SIZE+4;
 | |
| +    G.ecrec.ec64_start = ecrec64_start_offset;
 | |
| +    G.ecrec.ec64_end = ecrec64_start_offset +
 | |
| +                       12 + makeint64(&byterec[ECREC64_LENGTH]);
 | |
|  
 | |
|      /* Update the "end-of-central-dir offset" for later checks. */
 | |
|      G.real_ecrec_offset = ecrec64_start_offset;
 | |
| @@ -1542,6 +1546,8 @@ static int find_ecrec(__G__ searchlen)          /* return PK-class error */
 | |
|        makelong(&byterec[OFFSET_START_CENTRAL_DIRECTORY]);
 | |
|      G.ecrec.zipfile_comment_length =
 | |
|        makeword(&byterec[ZIPFILE_COMMENT_LENGTH]);
 | |
| +    G.ecrec.ec_start = G.real_ecrec_offset;
 | |
| +    G.ecrec.ec_end = G.ecrec.ec_start + 22 + G.ecrec.zipfile_comment_length;
 | |
|  
 | |
|      /* Now, we have to read the archive comment, BEFORE the file pointer
 | |
|         is moved away backwards to seek for a Zip64 ECLOC64 structure.
 | |
| diff --git a/unzpriv.h b/unzpriv.h
 | |
| index dc9eff5..297b3c7 100644
 | |
| --- a/unzpriv.h
 | |
| +++ b/unzpriv.h
 | |
| @@ -2185,6 +2185,16 @@ typedef struct VMStimbuf {
 | |
|         int have_ecr64;                  /* valid Zip64 ecdir-record exists */
 | |
|         int is_zip64_archive;            /* Zip64 ecdir-record is mandatory */
 | |
|         ush zipfile_comment_length;
 | |
| +       zusz_t ec_start, ec_end;         /* offsets of start and end of the
 | |
| +                                           end of central directory record,
 | |
| +                                           including if present the Zip64
 | |
| +                                           end of central directory locator,
 | |
| +                                           which immediately precedes the
 | |
| +                                           end of central directory record */
 | |
| +       zusz_t ec64_start, ec64_end;     /* if have_ecr64 is true, then these
 | |
| +                                           are the offsets of the start and
 | |
| +                                           end of the Zip64 end of central
 | |
| +                                           directory record */
 | |
|     } ecdir_rec;
 | |
|  
 | |
|  
 |