Kamil Dudka d431dc
From bc943b78268ad633f79756639d4295f7b61dbedd Mon Sep 17 00:00:00 2001
Kamil Dudka d431dc
From: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Date: Wed, 7 Nov 2018 14:04:52 +0100
Kamil Dudka d431dc
Subject: [PATCH 1/5] 43791: File descriptor could be closed twice in clone
Kamil Dudka d431dc
Kamil Dudka d431dc
Upstream-commit: a8cc017c74a916b690dc074c299faf4bd24b5af4
Kamil Dudka d431dc
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Kamil Dudka d431dc
Error: USE_AFTER_FREE (CWE-825):
Kamil Dudka d431dc
zsh-5.5.1/Src/Modules/clone.c:71: closed_arg: "close(int)" closes "ttyfd".
Kamil Dudka d431dc
zsh-5.5.1/Src/Modules/clone.c:99: double_close: Calling "close(int)" closes handle "ttyfd" which has already been closed.
Kamil Dudka d431dc
 97|   	setsparam("TTY", ztrdup(ttystrname));
Kamil Dudka d431dc
 98|       }
Kamil Dudka d431dc
 99|->     close(ttyfd);
Kamil Dudka d431dc
100|       if (pid < 0) {
Kamil Dudka d431dc
101|   	zerrnam(nam, "fork failed: %e", errno);
Kamil Dudka d431dc
---
Kamil Dudka d431dc
 Src/Modules/clone.c | 3 ++-
Kamil Dudka d431dc
 1 file changed, 2 insertions(+), 1 deletion(-)
Kamil Dudka d431dc
Kamil Dudka d431dc
diff --git a/Src/Modules/clone.c b/Src/Modules/clone.c
Kamil Dudka d431dc
index 9304292..dfd8e8a 100644
Kamil Dudka d431dc
--- a/Src/Modules/clone.c
Kamil Dudka d431dc
+++ b/Src/Modules/clone.c
Kamil Dudka d431dc
@@ -96,7 +96,8 @@ bin_clone(char *nam, char **args, UNUSED(Options ops), UNUSED(int func))
Kamil Dudka d431dc
 	init_io(NULL);
Kamil Dudka d431dc
 	setsparam("TTY", ztrdup(ttystrname));
Kamil Dudka d431dc
     }
Kamil Dudka d431dc
-    close(ttyfd);
Kamil Dudka d431dc
+    else
Kamil Dudka d431dc
+	close(ttyfd);
Kamil Dudka d431dc
     if (pid < 0) {
Kamil Dudka d431dc
 	zerrnam(nam, "fork failed: %e", errno);
Kamil Dudka d431dc
 	return 1;
Kamil Dudka d431dc
-- 
Kamil Dudka d431dc
2.17.2
Kamil Dudka d431dc
Kamil Dudka d431dc
Kamil Dudka d431dc
From 6096988f02635ed336a056e3670b63070400e6bc Mon Sep 17 00:00:00 2001
Kamil Dudka d431dc
From: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Date: Wed, 7 Nov 2018 14:04:53 +0100
Kamil Dudka d431dc
Subject: [PATCH 2/5] 43793: computil could overrun buffer
Kamil Dudka d431dc
Kamil Dudka d431dc
Upstream-commit: 031afe420725e328e9d7742be69ef0bd81c62b9a
Kamil Dudka d431dc
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Kamil Dudka d431dc
Error: BUFFER_SIZE (CWE-120):
Kamil Dudka d431dc
zsh-5.5.1/Src/Zle/computil.c:564: overlapping_buffer: The source buffer "str->str + 2" potentially overlaps with the destination buffer "str->str", which results in undefined behavior for "strcpy".
Kamil Dudka d431dc
zsh-5.5.1/Src/Zle/computil.c:564: remediation: Replace "strcpy(dest, src)" with "memmove(dest, src, strlen(src)+1)".
Kamil Dudka d431dc
562|                       str->str = ztrdup(str->str);
Kamil Dudka d431dc
563|                   if (hide[1] && str->str[0] == '-' && str->str[1] == '-')
Kamil Dudka d431dc
564|->                     strcpy(str->str, str->str + 2);
Kamil Dudka d431dc
565|                   else if (str->str[0] == '-' || str->str[0] == '+')
Kamil Dudka d431dc
566|                       strcpy(str->str, str->str + 1);
Kamil Dudka d431dc
Kamil Dudka d431dc
Error: BUFFER_SIZE (CWE-120):
Kamil Dudka d431dc
zsh-5.5.1/Src/Zle/computil.c:566: overlapping_buffer: The source buffer "str->str + 1" potentially overlaps with the destination buffer "str->str", which results in undefined behavior for "strcpy".
Kamil Dudka d431dc
zsh-5.5.1/Src/Zle/computil.c:566: remediation: Replace "strcpy(dest, src)" with "memmove(dest, src, strlen(src)+1)".
Kamil Dudka d431dc
564|                       strcpy(str->str, str->str + 2);
Kamil Dudka d431dc
565|                   else if (str->str[0] == '-' || str->str[0] == '+')
Kamil Dudka d431dc
566|->                     strcpy(str->str, str->str + 1);
Kamil Dudka d431dc
567|               }
Kamil Dudka d431dc
568|           }
Kamil Dudka d431dc
---
Kamil Dudka d431dc
 Src/Zle/computil.c | 4 ++--
Kamil Dudka d431dc
 1 file changed, 2 insertions(+), 2 deletions(-)
Kamil Dudka d431dc
Kamil Dudka d431dc
diff --git a/Src/Zle/computil.c b/Src/Zle/computil.c
Kamil Dudka d431dc
index 5526e0a..cb1c010 100644
Kamil Dudka d431dc
--- a/Src/Zle/computil.c
Kamil Dudka d431dc
+++ b/Src/Zle/computil.c
Kamil Dudka d431dc
@@ -561,9 +561,9 @@ cd_init(char *nam, char *hide, char *mlen, char *sep,
Kamil Dudka d431dc
                 if (str->str == str->match)
Kamil Dudka d431dc
                     str->str = ztrdup(str->str);
Kamil Dudka d431dc
                 if (hide[1] && str->str[0] == '-' && str->str[1] == '-')
Kamil Dudka d431dc
-                    strcpy(str->str, str->str + 2);
Kamil Dudka d431dc
+                    memmove(str->str, str->str + 2, strlen(str->str) - 1);
Kamil Dudka d431dc
                 else if (str->str[0] == '-' || str->str[0] == '+')
Kamil Dudka d431dc
-                    strcpy(str->str, str->str + 1);
Kamil Dudka d431dc
+                    memmove(str->str, str->str + 1, strlen(str->str));
Kamil Dudka d431dc
             }
Kamil Dudka d431dc
         }
Kamil Dudka d431dc
 	for (ap = args; *args &&
Kamil Dudka d431dc
-- 
Kamil Dudka d431dc
2.17.2
Kamil Dudka d431dc
Kamil Dudka d431dc
Kamil Dudka d431dc
From 29445bdf10714bd41d2124d3c31cc16c1f682854 Mon Sep 17 00:00:00 2001
Kamil Dudka d431dc
From: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Date: Wed, 7 Nov 2018 14:04:54 +0100
Kamil Dudka d431dc
Subject: [PATCH 3/5] 43723: file descriptor could leak on fork error
Kamil Dudka d431dc
Kamil Dudka d431dc
Upstream-commit: d1095bdf744c190c7e8ff126ba02caea8f63880d
Kamil Dudka d431dc
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Kamil Dudka d431dc
Error: RESOURCE_LEAK (CWE-772):
Kamil Dudka d431dc
zsh-5.5.1/Src/exec.c:4680: open_fn: Returning handle opened by "open".
Kamil Dudka d431dc
zsh-5.5.1/Src/exec.c:4680: var_assign: Assigning: "fd" = handle returned from "open(nam, 449, 384)".
Kamil Dudka d431dc
zsh-5.5.1/Src/exec.c:4810: leaked_handle: Handle variable "fd" going out of scope leaks the handle.
Kamil Dudka d431dc
4808|   	/* fork or open error */
Kamil Dudka d431dc
4809|   	child_unblock();
Kamil Dudka d431dc
4810|-> 	return nam;
Kamil Dudka d431dc
4811|       } else if (pid) {
Kamil Dudka d431dc
4812|   	int os;
Kamil Dudka d431dc
---
Kamil Dudka d431dc
 Src/exec.c | 3 ++-
Kamil Dudka d431dc
 1 file changed, 2 insertions(+), 1 deletion(-)
Kamil Dudka d431dc
Kamil Dudka d431dc
diff --git a/Src/exec.c b/Src/exec.c
Kamil Dudka d431dc
index 0908a1a..8045db2 100644
Kamil Dudka d431dc
--- a/Src/exec.c
Kamil Dudka d431dc
+++ b/Src/exec.c
Kamil Dudka d431dc
@@ -4722,7 +4722,8 @@ getoutputfile(char *cmd, char **eptr)
Kamil Dudka d431dc
     }
Kamil Dudka d431dc
 
Kamil Dudka d431dc
     if ((cmdoutpid = pid = zfork(NULL)) == -1) {
Kamil Dudka d431dc
-	/* fork or open error */
Kamil Dudka d431dc
+	/* fork error */
Kamil Dudka d431dc
+	close(fd);
Kamil Dudka d431dc
 	child_unblock();
Kamil Dudka d431dc
 	return nam;
Kamil Dudka d431dc
     } else if (pid) {
Kamil Dudka d431dc
-- 
Kamil Dudka d431dc
2.17.2
Kamil Dudka d431dc
Kamil Dudka d431dc
Kamil Dudka d431dc
From afb4192a75066f86ce7051a72c0feb7b80c0cdd8 Mon Sep 17 00:00:00 2001
Kamil Dudka d431dc
From: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Date: Wed, 7 Nov 2018 14:04:55 +0100
Kamil Dudka d431dc
Subject: [PATCH 4/5] 43789: possible use after free clearing up math func from
Kamil Dudka d431dc
 module
Kamil Dudka d431dc
Kamil Dudka d431dc
Upstream-commit: e27175c7c8cdfeb4e28d4ff21eb51aa003d70a03
Kamil Dudka d431dc
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Kamil Dudka d431dc
Error: USE_AFTER_FREE (CWE-825):
Kamil Dudka d431dc
zsh-5.5.1/Src/module.c:1390: freed_arg: "deletemathfunc" frees "f".
Kamil Dudka d431dc
zsh-5.5.1/Src/module.c:1352:6: freed_arg: "zfree" frees parameter "f".
Kamil Dudka d431dc
zsh-5.5.1/Src/mem.c:1888:5: freed_arg: "free" frees parameter "p".
Kamil Dudka d431dc
zsh-5.5.1/Src/module.c:1394: deref_after_free: Dereferencing freed pointer "f".
Kamil Dudka d431dc
1392|   		ret = 1;
Kamil Dudka d431dc
1393|   	    } else {
Kamil Dudka d431dc
1394|-> 		f->flags &= ~MFF_ADDED;
Kamil Dudka d431dc
1395|   	    }
Kamil Dudka d431dc
1396|   	}
Kamil Dudka d431dc
---
Kamil Dudka d431dc
 Src/module.c | 2 --
Kamil Dudka d431dc
 1 file changed, 2 deletions(-)
Kamil Dudka d431dc
Kamil Dudka d431dc
diff --git a/Src/module.c b/Src/module.c
Kamil Dudka d431dc
index 4ae7831..33d75eb 100644
Kamil Dudka d431dc
--- a/Src/module.c
Kamil Dudka d431dc
+++ b/Src/module.c
Kamil Dudka d431dc
@@ -1390,8 +1390,6 @@ setmathfuncs(char const *nam, MathFunc f, int size, int *e)
Kamil Dudka d431dc
 	    if (deletemathfunc(f)) {
Kamil Dudka d431dc
 		zwarnnam(nam, "math function `%s' already deleted", f->name);
Kamil Dudka d431dc
 		ret = 1;
Kamil Dudka d431dc
-	    } else {
Kamil Dudka d431dc
-		f->flags &= ~MFF_ADDED;
Kamil Dudka d431dc
 	    }
Kamil Dudka d431dc
 	}
Kamil Dudka d431dc
 	f++;
Kamil Dudka d431dc
-- 
Kamil Dudka d431dc
2.17.2
Kamil Dudka d431dc
Kamil Dudka d431dc
Kamil Dudka d431dc
From 4553645c00d9a2e81a79e2014b106f6590500287 Mon Sep 17 00:00:00 2001
Kamil Dudka d431dc
From: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Date: Wed, 7 Nov 2018 14:04:56 +0100
Kamil Dudka d431dc
Subject: [PATCH 5/5] 43790: failed mailstat could leak memory
Kamil Dudka d431dc
Kamil Dudka d431dc
Upstream-commit: d50e204b0c4c10164a711bf640500e46987de9c3
Kamil Dudka d431dc
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
Kamil Dudka d431dc
Kamil Dudka d431dc
Error: RESOURCE_LEAK (CWE-772):
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7406: alloc_fn: Storage is returned from allocation function "appstr".
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: alloc_fn: Storage is returned from allocation function "realloc".
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: identity_transfer: Passing "realloc(base, strlen(base) + strlen(append) + 1UL)" as argument 1 to function "strcat", which returns that argument.
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: return_alloc_fn: Directly returning storage allocated by "strcat".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7406: var_assign: Assigning: "dir" = storage returned from "appstr(ztrdup(path), "/cur")".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7407: noescape: Resource "dir" is not freed or pointed-to in "stat".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7407: leaked_storage: Variable "dir" going out of scope leaks the storage it points to.
Kamil Dudka d431dc
7405|          /* See if cur/ is present */
Kamil Dudka d431dc
7406|          dir = appstr(ztrdup(path), "/cur");
Kamil Dudka d431dc
7407|->        if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) return 0;
Kamil Dudka d431dc
7408|          st_ret.st_atime = st_tmp.st_atime;
Kamil Dudka d431dc
7409|
Kamil Dudka d431dc
Kamil Dudka d431dc
Error: RESOURCE_LEAK (CWE-772):
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7412: alloc_fn: Storage is returned from allocation function "appstr".
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: alloc_fn: Storage is returned from allocation function "realloc".
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: identity_transfer: Passing "realloc(base, strlen(base) + strlen(append) + 1UL)" as argument 1 to function "strcat", which returns that argument.
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: return_alloc_fn: Directly returning storage allocated by "strcat".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7412: var_assign: Assigning: "dir" = storage returned from "appstr(dir, "/tmp")".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7413: noescape: Resource "dir" is not freed or pointed-to in "stat".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7413: leaked_storage: Variable "dir" going out of scope leaks the storage it points to.
Kamil Dudka d431dc
7411|          dir[plen] = 0;
Kamil Dudka d431dc
7412|          dir = appstr(dir, "/tmp");
Kamil Dudka d431dc
7413|->        if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) return 0;
Kamil Dudka d431dc
7414|          st_ret.st_mtime = st_tmp.st_mtime;
Kamil Dudka d431dc
7415|
Kamil Dudka d431dc
Kamil Dudka d431dc
Error: RESOURCE_LEAK (CWE-772):
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7418: alloc_fn: Storage is returned from allocation function "appstr".
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: alloc_fn: Storage is returned from allocation function "realloc".
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: identity_transfer: Passing "realloc(base, strlen(base) + strlen(append) + 1UL)" as argument 1 to function "strcat", which returns that argument.
Kamil Dudka d431dc
zsh-5.5.1/Src/string.c:200:5: return_alloc_fn: Directly returning storage allocated by "strcat".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7418: var_assign: Assigning: "dir" = storage returned from "appstr(dir, "/new")".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7419: noescape: Resource "dir" is not freed or pointed-to in "stat".
Kamil Dudka d431dc
zsh-5.5.1/Src/utils.c:7419: leaked_storage: Variable "dir" going out of scope leaks the storage it points to.
Kamil Dudka d431dc
7417|          dir[plen] = 0;
Kamil Dudka d431dc
7418|          dir = appstr(dir, "/new");
Kamil Dudka d431dc
7419|->        if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) return 0;
Kamil Dudka d431dc
7420|          st_ret.st_mtime = st_tmp.st_mtime;
Kamil Dudka d431dc
7421|
Kamil Dudka d431dc
---
Kamil Dudka d431dc
 Src/utils.c | 16 +++++++++++++---
Kamil Dudka d431dc
 1 file changed, 13 insertions(+), 3 deletions(-)
Kamil Dudka d431dc
Kamil Dudka d431dc
diff --git a/Src/utils.c b/Src/utils.c
Kamil Dudka d431dc
index b418517..492babc 100644
Kamil Dudka d431dc
--- a/Src/utils.c
Kamil Dudka d431dc
+++ b/Src/utils.c
Kamil Dudka d431dc
@@ -7404,19 +7404,28 @@ mailstat(char *path, struct stat *st)
Kamil Dudka d431dc
 
Kamil Dudka d431dc
        /* See if cur/ is present */
Kamil Dudka d431dc
        dir = appstr(ztrdup(path), "/cur");
Kamil Dudka d431dc
-       if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) return 0;
Kamil Dudka d431dc
+       if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) {
Kamil Dudka d431dc
+	   zsfree(dir);
Kamil Dudka d431dc
+	   return 0;
Kamil Dudka d431dc
+       }
Kamil Dudka d431dc
        st_ret.st_atime = st_tmp.st_atime;
Kamil Dudka d431dc
 
Kamil Dudka d431dc
        /* See if tmp/ is present */
Kamil Dudka d431dc
        dir[plen] = 0;
Kamil Dudka d431dc
        dir = appstr(dir, "/tmp");
Kamil Dudka d431dc
-       if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) return 0;
Kamil Dudka d431dc
+       if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) {
Kamil Dudka d431dc
+	   zsfree(dir);
Kamil Dudka d431dc
+	   return 0;
Kamil Dudka d431dc
+       }
Kamil Dudka d431dc
        st_ret.st_mtime = st_tmp.st_mtime;
Kamil Dudka d431dc
 
Kamil Dudka d431dc
        /* And new/ */
Kamil Dudka d431dc
        dir[plen] = 0;
Kamil Dudka d431dc
        dir = appstr(dir, "/new");
Kamil Dudka d431dc
-       if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) return 0;
Kamil Dudka d431dc
+       if (stat(dir, &st_tmp) || !S_ISDIR(st_tmp.st_mode)) {
Kamil Dudka d431dc
+	   zsfree(dir);
Kamil Dudka d431dc
+	   return 0;
Kamil Dudka d431dc
+       }
Kamil Dudka d431dc
        st_ret.st_mtime = st_tmp.st_mtime;
Kamil Dudka d431dc
 
Kamil Dudka d431dc
 #if THERE_IS_EXACTLY_ONE_MAILDIR_IN_MAILPATH
Kamil Dudka d431dc
@@ -7428,6 +7437,7 @@ mailstat(char *path, struct stat *st)
Kamil Dudka d431dc
            st_tmp.st_atime == st_new_last.st_atime &&
Kamil Dudka d431dc
            st_tmp.st_mtime == st_new_last.st_mtime) {
Kamil Dudka d431dc
 	   *st = st_ret_last;
Kamil Dudka d431dc
+	   zsfree(dir);
Kamil Dudka d431dc
 	   return 0;
Kamil Dudka d431dc
        }
Kamil Dudka d431dc
        st_new_last = st_tmp;
Kamil Dudka d431dc
-- 
Kamil Dudka d431dc
2.17.2
Kamil Dudka d431dc