Blame SOURCES/0001-Avoid-returning-CHM-file-entries-that-are-blank-beca.patch

e5dbd7
From b86a2e455cc4d3f586367ab05af1f1be00c6df65 Mon Sep 17 00:00:00 2001
bb8541
From: Stuart Caie <kyzer@cabextract.org.uk>
bb8541
Date: Wed, 17 Oct 2018 11:29:03 +0100
e5dbd7
Subject: [PATCH 1/3] Avoid returning CHM file entries that are "blank" because
bb8541
 they have embedded null bytes
bb8541
bb8541
(cherry picked from commit 8759da8db6ec9e866cb8eb143313f397f925bb4f)
bb8541
---
bb8541
 libmspack/mspack/chmd.c | 6 +++---
bb8541
 1 file changed, 3 insertions(+), 3 deletions(-)
bb8541
bb8541
diff --git a/libmspack/mspack/chmd.c b/libmspack/mspack/chmd.c
bb8541
index b3f7fee..1d198bf 100644
bb8541
--- a/libmspack/mspack/chmd.c
bb8541
+++ b/libmspack/mspack/chmd.c
bb8541
@@ -447,14 +447,14 @@ static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh,
bb8541
     while (num_entries--) {
bb8541
       READ_ENCINT(name_len);
bb8541
       if (name_len > (unsigned int) (end - p)) goto chunk_end;
bb8541
-      /* consider blank filenames to be an error */
bb8541
-      if (name_len == 0) goto chunk_end;
bb8541
       name = p; p += name_len;
bb8541
-
bb8541
       READ_ENCINT(section);
bb8541
       READ_ENCINT(offset);
bb8541
       READ_ENCINT(length);
bb8541
 
bb8541
+      /* ignore blank or one-char (e.g. "/") filenames we'd return as blank */
bb8541
+      if (name_len < 2 || !name[0] || !name[1]) continue;
bb8541
+
bb8541
       /* empty files and directory names are stored as a file entry at
bb8541
        * offset 0 with length 0. We want to keep empty files, but not
bb8541
        * directory names, which end with a "/" */
bb8541
-- 
e5dbd7
2.22.0
bb8541