Blame SOURCES/0130-dd-harden-functions-against-directory-traversal-issu.patch

562801
From 239c4f7d1f47265526b39ad70106767d00805277 Mon Sep 17 00:00:00 2001
562801
From: Jakub Filak <jfilak@redhat.com>
562801
Date: Thu, 23 Apr 2015 13:30:15 +0200
562801
Subject: [LIBREPORT PATCH] dd: harden functions against directory traversal
562801
 issues
562801
562801
Test correctness of all accessed dump dir files in all dd* functions.
562801
Before this commit, the callers were allowed to pass strings like
562801
"../../etc/shadow" in the filename argument of all dd* functions.
562801
562801
Related: #1214457
562801
562801
Signed-off-by: Jakub Filak <jfilak@redhat.com>
562801
---
562801
 src/lib/create_dump_dir.c | 19 ++++++++++++-------
562801
 src/lib/dump_dir.c        | 22 ++++++++++++++++++++++
562801
 2 files changed, 34 insertions(+), 7 deletions(-)
562801
562801
diff --git a/src/lib/create_dump_dir.c b/src/lib/create_dump_dir.c
562801
index 4f67523..989a50c 100644
562801
--- a/src/lib/create_dump_dir.c
562801
+++ b/src/lib/create_dump_dir.c
562801
@@ -42,6 +42,12 @@ struct dump_dir *create_dump_dir_from_problem_data(problem_data_t *problem_data,
562801
         return NULL;
562801
     }
562801
 
562801
+    if (!str_is_correct_filename(type))
562801
+    {
562801
+        error_msg(_("'%s' is not correct file name"), FILENAME_ANALYZER);
562801
+        return NULL;
562801
+    }
562801
+
562801
     uid_t uid = (uid_t)-1L;
562801
     char *uid_str = problem_data_get_content_or_NULL(problem_data, FILENAME_UID);
562801
 
562801
@@ -105,6 +111,12 @@ struct dump_dir *create_dump_dir_from_problem_data(problem_data_t *problem_data,
562801
     g_hash_table_iter_init(&iter, problem_data);
562801
     while (g_hash_table_iter_next(&iter, (void**)&name, (void**)&value))
562801
     {
562801
+        if (!str_is_correct_filename(name))
562801
+        {
562801
+            error_msg("Problem data field name contains disallowed chars: '%s'", name);
562801
+            continue;
562801
+        }
562801
+
562801
         if (value->flags & CD_FLAG_BIN)
562801
         {
562801
             char *dest = concat_path_file(dd->dd_dirname, name);
562801
@@ -119,13 +131,6 @@ struct dump_dir *create_dump_dir_from_problem_data(problem_data_t *problem_data,
562801
             continue;
562801
         }
562801
 
562801
-        /* only files should contain '/' and those are handled earlier */
562801
-        if (name[0] == '.' || strchr(name, '/'))
562801
-        {
562801
-            error_msg("Problem data field name contains disallowed chars: '%s'", name);
562801
-            continue;
562801
-        }
562801
-
562801
         dd_save_text(dd, name, value->content);
562801
     }
562801
 
562801
diff --git a/src/lib/dump_dir.c b/src/lib/dump_dir.c
562801
index 2a65100..0048faf 100644
562801
--- a/src/lib/dump_dir.c
562801
+++ b/src/lib/dump_dir.c
562801
@@ -345,6 +345,9 @@ static inline struct dump_dir *dd_init(void)
562801
 
562801
 int dd_exist(const struct dump_dir *dd, const char *path)
562801
 {
562801
+    if (!str_is_correct_filename(path))
562801
+        error_msg_and_die("Cannot test existence. '%s' is not a valid file name", path);
562801
+
562801
     char *full_path = concat_path_file(dd->dd_dirname, path);
562801
     int ret = exist_file_dir(full_path);
562801
     free(full_path);
562801
@@ -1044,6 +1047,13 @@ char* dd_load_text_ext(const struct dump_dir *dd, const char *name, unsigned fla
562801
 //    if (!dd->locked)
562801
 //        error_msg_and_die("dump_dir is not opened"); /* bug */
562801
 
562801
+    if (!str_is_correct_filename(name))
562801
+    {
562801
+        error_msg("Cannot load text. '%s' is not a valid file name", name);
562801
+        if (!(flags & DD_LOAD_TEXT_RETURN_NULL_ON_FAILURE))
562801
+            xfunc_die();
562801
+    }
562801
+
562801
     /* Compat with old abrt dumps. Remove in abrt-2.1 */
562801
     if (strcmp(name, "release") == 0)
562801
         name = FILENAME_OS_RELEASE;
562801
@@ -1065,6 +1075,9 @@ void dd_save_text(struct dump_dir *dd, const char *name, const char *data)
562801
     if (!dd->locked)
562801
         error_msg_and_die("dump_dir is not opened"); /* bug */
562801
 
562801
+    if (!str_is_correct_filename(name))
562801
+        error_msg_and_die("Cannot save text. '%s' is not a valid file name", name);
562801
+
562801
     char *full_path = concat_path_file(dd->dd_dirname, name);
562801
     save_binary_file(full_path, data, strlen(data), dd->dd_uid, dd->dd_gid, dd->mode);
562801
     free(full_path);
562801
@@ -1075,6 +1088,9 @@ void dd_save_binary(struct dump_dir* dd, const char* name, const char* data, uns
562801
     if (!dd->locked)
562801
         error_msg_and_die("dump_dir is not opened"); /* bug */
562801
 
562801
+    if (!str_is_correct_filename(name))
562801
+        error_msg_and_die("Cannot save binary. '%s' is not a valid file name", name);
562801
+
562801
     char *full_path = concat_path_file(dd->dd_dirname, name);
562801
     save_binary_file(full_path, data, size, dd->dd_uid, dd->dd_gid, dd->mode);
562801
     free(full_path);
562801
@@ -1082,6 +1098,9 @@ void dd_save_binary(struct dump_dir* dd, const char* name, const char* data, uns
562801
 
562801
 long dd_get_item_size(struct dump_dir *dd, const char *name)
562801
 {
562801
+    if (!str_is_correct_filename(name))
562801
+        error_msg_and_die("Cannot get item size. '%s' is not a valid file name", name);
562801
+
562801
     long size = -1;
562801
     char *iname = concat_path_file(dd->dd_dirname, name);
562801
     struct stat statbuf;
562801
@@ -1106,6 +1125,9 @@ int dd_delete_item(struct dump_dir *dd, const char *name)
562801
     if (!dd->locked)
562801
         error_msg_and_die("dump_dir is not opened"); /* bug */
562801
 
562801
+    if (!str_is_correct_filename(name))
562801
+        error_msg_and_die("Cannot delete item. '%s' is not a valid file name", name);
562801
+
562801
     char *path = concat_path_file(dd->dd_dirname, name);
562801
     int res = unlink(path);
562801
 
562801
-- 
562801
1.8.3.1
562801