Blame SOURCES/0003-libssh2-1.8.0-CVE-2019-3857.patch

0b3366
From cbd8d5c44701f97eccd6602e3d745fc37a8d7ff4 Mon Sep 17 00:00:00 2001
0b3366
From: Kamil Dudka <kdudka@redhat.com>
0b3366
Date: Tue, 19 Mar 2019 13:29:35 +0100
0b3366
Subject: [PATCH 1/2] Resolves: CVE-2019-3857 - fix integer overflow in SSH
0b3366
 packet processing channel
0b3366
0b3366
... resulting in out of bounds write
0b3366
0b3366
Upstream-Patch: https://libssh2.org/1.8.0-CVE/CVE-2019-3857.patch
0b3366
---
0b3366
 include/libssh2.h | 12 ++++++++++++
0b3366
 src/packet.c      | 11 +++++++++--
0b3366
 2 files changed, 21 insertions(+), 2 deletions(-)
0b3366
0b3366
diff --git a/include/libssh2.h b/include/libssh2.h
0b3366
index 34d2842..e25c380 100644
0b3366
--- a/include/libssh2.h
0b3366
+++ b/include/libssh2.h
0b3366
@@ -145,6 +145,18 @@ typedef int libssh2_socket_t;
0b3366
 #define LIBSSH2_INVALID_SOCKET -1
0b3366
 #endif /* WIN32 */
0b3366
 
0b3366
+#ifndef SIZE_MAX
0b3366
+#if _WIN64
0b3366
+#define SIZE_MAX 0xFFFFFFFFFFFFFFFF
0b3366
+#else
0b3366
+#define SIZE_MAX 0xFFFFFFFF
0b3366
+#endif
0b3366
+#endif
0b3366
+
0b3366
+#ifndef UINT_MAX
0b3366
+#define UINT_MAX 0xFFFFFFFF
0b3366
+#endif
0b3366
+
0b3366
 /*
0b3366
  * Determine whether there is small or large file support on windows.
0b3366
  */
0b3366
diff --git a/src/packet.c b/src/packet.c
0b3366
index 5f1feb8..aa10633 100644
0b3366
--- a/src/packet.c
0b3366
+++ b/src/packet.c
0b3366
@@ -815,8 +815,15 @@ _libssh2_packet_add(LIBSSH2_SESSION * session, unsigned char *data,
0b3366
                         /* set signal name (without SIG prefix) */
0b3366
                         uint32_t namelen =
0b3366
                             _libssh2_ntohu32(data + 9 + sizeof("exit-signal"));
0b3366
-                        channelp->exit_signal =
0b3366
-                            LIBSSH2_ALLOC(session, namelen + 1);
0b3366
+
0b3366
+                        if(namelen <= UINT_MAX - 1) {
0b3366
+                            channelp->exit_signal =
0b3366
+                                LIBSSH2_ALLOC(session, namelen + 1);
0b3366
+                        }
0b3366
+                        else {
0b3366
+                            channelp->exit_signal = NULL;
0b3366
+                        }
0b3366
+
0b3366
                         if (!channelp->exit_signal)
0b3366
                             rc = _libssh2_error(session, LIBSSH2_ERROR_ALLOC,
0b3366
                                                 "memory for signal name");
0b3366
-- 
0b3366
2.17.2
0b3366
0b3366
0b3366
From 0708c71871976ccf6d45fd0971a079d271413f92 Mon Sep 17 00:00:00 2001
0b3366
From: Michael Buckley <michael@buckleyisms.com>
0b3366
Date: Mon, 18 Mar 2019 15:07:12 -0700
0b3366
Subject: [PATCH 2/2] Move fallback SIZE_MAX and UINT_MAX to libssh2_priv.h
0b3366
0b3366
Upstream-commit: 31d0b1a8530b959bd12c2074dc6e883e1eda8207
0b3366
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
0b3366
---
0b3366
 include/libssh2.h  | 12 ------------
0b3366
 src/libssh2_priv.h | 12 ++++++++++++
0b3366
 2 files changed, 12 insertions(+), 12 deletions(-)
0b3366
0b3366
diff --git a/include/libssh2.h b/include/libssh2.h
0b3366
index e25c380..34d2842 100644
0b3366
--- a/include/libssh2.h
0b3366
+++ b/include/libssh2.h
0b3366
@@ -145,18 +145,6 @@ typedef int libssh2_socket_t;
0b3366
 #define LIBSSH2_INVALID_SOCKET -1
0b3366
 #endif /* WIN32 */
0b3366
 
0b3366
-#ifndef SIZE_MAX
0b3366
-#if _WIN64
0b3366
-#define SIZE_MAX 0xFFFFFFFFFFFFFFFF
0b3366
-#else
0b3366
-#define SIZE_MAX 0xFFFFFFFF
0b3366
-#endif
0b3366
-#endif
0b3366
-
0b3366
-#ifndef UINT_MAX
0b3366
-#define UINT_MAX 0xFFFFFFFF
0b3366
-#endif
0b3366
-
0b3366
 /*
0b3366
  * Determine whether there is small or large file support on windows.
0b3366
  */
0b3366
diff --git a/src/libssh2_priv.h b/src/libssh2_priv.h
0b3366
index b4296a2..bb5d1a5 100644
0b3366
--- a/src/libssh2_priv.h
0b3366
+++ b/src/libssh2_priv.h
0b3366
@@ -146,6 +146,18 @@ static inline int writev(int sock, struct iovec *iov, int nvecs)
0b3366
 
0b3366
 #endif
0b3366
 
0b3366
+#ifndef SIZE_MAX
0b3366
+#if _WIN64
0b3366
+#define SIZE_MAX 0xFFFFFFFFFFFFFFFF
0b3366
+#else
0b3366
+#define SIZE_MAX 0xFFFFFFFF
0b3366
+#endif
0b3366
+#endif
0b3366
+
0b3366
+#ifndef UINT_MAX
0b3366
+#define UINT_MAX 0xFFFFFFFF
0b3366
+#endif
0b3366
+
0b3366
 /* RFC4253 section 6.1 Maximum Packet Length says:
0b3366
  *
0b3366
  * "All implementations MUST be able to process packets with
0b3366
-- 
0b3366
2.17.2
0b3366