Blame SOURCES/0098-ccpp-check-for-overflow-in-abrt-coredump-path-creati.patch

baab13
From 28ce40d8db91c1926a95f21ef19a980a8af88471 Mon Sep 17 00:00:00 2001
baab13
From: Jakub Filak <jfilak@redhat.com>
baab13
Date: Fri, 17 Apr 2015 14:43:59 +0200
baab13
Subject: [ABRT PATCH] ccpp: check for overflow in abrt coredump path creation
baab13
baab13
This issue was discovered by Florian Weimer of Red Hat Product Security.
baab13
baab13
Signed-off-by: Jakub Filak <jfilak@redhat.com>
baab13
---
baab13
 src/hooks/abrt-hook-ccpp.c | 4 +++-
baab13
 1 file changed, 3 insertions(+), 1 deletion(-)
baab13
baab13
diff --git a/src/hooks/abrt-hook-ccpp.c b/src/hooks/abrt-hook-ccpp.c
baab13
index d9f1f5e..81f9349 100644
baab13
--- a/src/hooks/abrt-hook-ccpp.c
baab13
+++ b/src/hooks/abrt-hook-ccpp.c
baab13
@@ -669,7 +669,9 @@ int main(int argc, char** argv)
baab13
          * and maybe crash again...
baab13
          * Unlike dirs, mere files are ignored by abrtd.
baab13
          */
baab13
-        snprintf(path, sizeof(path), "%s/%s-coredump", g_settings_dump_location, last_slash);
baab13
+        if (snprintf(path, sizeof(path), "%s/%s-coredump", g_settings_dump_location, last_slash) >= sizeof(path))
baab13
+            error_msg_and_die("Error saving '%s': truncated long file path", path);
baab13
+
baab13
         int abrt_core_fd = xopen3(path, O_WRONLY | O_CREAT | O_TRUNC, 0600);
baab13
         off_t core_size = copyfd_eof(STDIN_FILENO, abrt_core_fd, COPYFD_SPARSE);
baab13
         if (core_size < 0 || fsync(abrt_core_fd) != 0)
baab13
-- 
baab13
1.8.3.1
baab13