Blame SOURCES/libarchive-3.1.3-CVE-2013-0211_read_buffer_overflow.patch

58251f
From 22531545514043e04633e1c015c7540b9de9dbe4 Mon Sep 17 00:00:00 2001
58251f
From: Tim Kientzle <kientzle@acm.org>
58251f
Date: Fri, 22 Mar 2013 23:48:41 -0700
58251f
Subject: [PATCH] Limit write requests to at most INT_MAX. This prevents a
58251f
 certain common programming error (passing -1 to write) from leading to other
58251f
 problems deeper in the library.
58251f
58251f
---
58251f
 libarchive/archive_write.c | 5 +++++
58251f
 1 file changed, 5 insertions(+)
58251f
58251f
diff --git a/libarchive/archive_write.c b/libarchive/archive_write.c
58251f
index eede5e0..be85621 100644
58251f
--- a/libarchive/archive_write.c
58251f
+++ b/libarchive/archive_write.c
58251f
@@ -673,8 +673,13 @@ static ssize_t
58251f
 _archive_write_data(struct archive *_a, const void *buff, size_t s)
58251f
 {
58251f
 	struct archive_write *a = (struct archive_write *)_a;
58251f
+	const size_t max_write = INT_MAX;
58251f
+
58251f
 	archive_check_magic(&a->archive, ARCHIVE_WRITE_MAGIC,
58251f
 	    ARCHIVE_STATE_DATA, "archive_write_data");
58251f
+	/* In particular, this catches attempts to pass negative values. */
58251f
+	if (s > max_write)
58251f
+		s = max_write;
58251f
 	archive_clear_error(&a->archive);
58251f
 	return ((a->format_write_data)(a, buff, s));
58251f
 }
58251f
-- 
58251f
1.8.1
58251f