diff options
author | V3n3RiX <venerix@redcorelinux.org> | 2018-05-13 16:38:56 +0100 |
---|---|---|
committer | V3n3RiX <venerix@redcorelinux.org> | 2018-05-13 16:38:56 +0100 |
commit | ea31ad0ed5501d0bf92267c35beaf06ac016bad2 (patch) | |
tree | 2fdc433d571e3ead010876d43ce2646b7d783680 /net-misc/rsync | |
parent | 88ebe56470c37b02a044e1091cad6b2df0f3be8f (diff) |
gentoo resync : 13.05.2018
Diffstat (limited to 'net-misc/rsync')
6 files changed, 0 insertions, 149 deletions
diff --git a/net-misc/rsync/Manifest b/net-misc/rsync/Manifest index 6154fa2f9d21..6726402a96ec 100644 --- a/net-misc/rsync/Manifest +++ b/net-misc/rsync/Manifest @@ -1,8 +1,3 @@ -AUX rsync-3.1.2-CVE-2017-16548.patch 770 BLAKE2B 1121869250bcf22b5b5aa133f44d49ca50a203d79a66cdcce1177f7b46cda77d8c747e340f9bfc22bac648ae025fece6ac6d4adc086d486a13aa84e9f0a11ca1 SHA512 6b000e1e13f48050e0cea2ff3741d48d73694601911d961baf41d4a2d8571c2385e90dde2054e4f400767cfc3488d805d19d239c30e1049783efce1151a8a0aa -AUX rsync-3.1.2-CVE-2017-17433-fixup.patch 1303 BLAKE2B dfbec423114ff9925d9720b0448b168d70dd0e85b8857929abff7d7a1ddb1c6e4b4a08826e6e98620700c1d9a72d068688586fd0ec14cd537863b7e18974cd84 SHA512 63ebdf107f18f4bcad0eeed6d230e8aba93dcb4555b46e05566bc256fbd761122675a4bba29bce75f97e927ec6f82336e0445998277b8eb9d1b4414e1e0fcb47 -AUX rsync-3.1.2-CVE-2017-17433.patch 1243 BLAKE2B 137066fa687b0c0f03726151eac143f401cdebf7b7ce54ac8dbdf5f4261861b0a65a8d4f635292423e6bfcd765a402d7fa9014545b5b0e40972c8adc62e0ba22 SHA512 424ce1c502250d7ac21666ef933cb481c30aebb46249bd62f90af80b714a1409df4888cba91af9d9681947e1eab36d69e191e4fc01a75699b6895af624f7e833 -AUX rsync-3.1.2-CVE-2017-17434-part1.patch 774 BLAKE2B 659863169e2cb3ae6848bc9dfec771bb6a780c7056f3c27fd5ec1a891f0db2679ac01c5cd587215cf9729d2bf58e2f3b8246c13a57c793af443411aa231f353f SHA512 977d5fd31c063f6130f20f3b0c3453c8cb4cf5891fc54be2c661c8e89c19a353b4cfbffd934ee80bf44e4de81d1f4a29fa0f8ae01a2d0a9777c081396a87cbdd -AUX rsync-3.1.2-CVE-2017-17434-part2.patch 1026 BLAKE2B 8b9472c6da4ae584ea665050aa1c6741d443e281bec56acef86b0296e60339e6beab0588ae01b8fe4a4f5c8731d497dede7dd818c1aafe405ae987fe44dc7cdf SHA512 70f94901a0d2762c22c922bd9999c92562a459cc7169392fd67d187570278f6f51cda2c8eec3a59920f48be01f2a12cda6151a07864a4f9a961decf3592e7485 AUX rsyncd.conf-3.0.9-r1 449 BLAKE2B 7cb543dc9430a05d21d10951c065ce588d8f774811b36d2380027bf18760776797d790f5c736eece3176a2dc206e695fc3486587dd8a92fbba96102e63dbf4e9 SHA512 8d51b452be88820c38639aa833490a001abc2edba03133441000634c2ec090d243598b0932fc11abdf1286afdab02eb6532df2b28a48bfde781c3a8b61fe8c6f AUX rsyncd.conf.d 149 BLAKE2B fd2556d0c270c2baa83d4d474d44ab1d16e35f112279a339f179f9af693d977cc0863bf4cd7139363c58e4e6a1a18a24c06474ecc248167224261dbaf04ae0a8 SHA512 8ea9a2f1fea508fa132313fa16513eac84a9ed3ce75741c42769b56bbcd3f1bd2eb8bfdfe40a6c7f619e4281e8fc8d95d1bd84096d0b64aaacf606cd614ae5b3 AUX rsyncd.init.d-r1 247 BLAKE2B ec4f7a875a51bae10cff7e15df18d285b01dddaa99a03127ba242ec535b7c8a3af3ad4489661ba7b5f6b074e2af38b12da394c0f8992bd28328d807a89757bb0 SHA512 df2ef4d9e65fa72daa9a7d91d69a06027d0e0fbc48f9ebd485e2d51990c8d00985b7ccf41314f984975e8073e2075bbdfe5543754718381497c334dc7d96451a diff --git a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-16548.patch b/net-misc/rsync/files/rsync-3.1.2-CVE-2017-16548.patch deleted file mode 100644 index d06607cf772c..000000000000 --- a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-16548.patch +++ /dev/null @@ -1,17 +0,0 @@ -X-Git-Url: https://git.samba.org/rsync.git/?p=rsync.git;a=blobdiff_plain;f=xattrs.c;h=4867e6f5b8ad2934d43b06f3b99b7b3690a6dc7a;hp=68305d7559b34f5cc2f196b74429b82fa6ff49dd;hb=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1;hpb=bc112b0e7feece62ce98708092306639a8a53cce - -diff --git a/xattrs.c b/xattrs.c -index 68305d7..4867e6f 100644 ---- a/xattrs.c -+++ b/xattrs.c -@@ -824,6 +824,10 @@ void receive_xattr(int f, struct file_struct *file) - out_of_memory("receive_xattr"); - name = ptr + dget_len + extra_len; - read_buf(f, name, name_len); -+ if (name_len < 1 || name[name_len-1] != '\0') { -+ rprintf(FERROR, "Invalid xattr name received (missing trailing \\0).\n"); -+ exit_cleanup(RERR_FILEIO); -+ } - if (dget_len == datum_len) - read_buf(f, ptr, dget_len); - else { diff --git a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17433-fixup.patch b/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17433-fixup.patch deleted file mode 100644 index 0cc9b8256dd2..000000000000 --- a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17433-fixup.patch +++ /dev/null @@ -1,33 +0,0 @@ -From: Wayne Davison <wayned@samba.org> -Date: Sun, 3 Dec 2017 23:49:56 +0000 (-0800) -Subject: Fix issue with earlier path-check (fixes "make check") -X-Git-Url: https://git.samba.org/?p=rsync.git;a=commitdiff_plain;h=f5e8a17e093065fb20fea00a29540fe2c7896441;hp=5509597decdbd7b91994210f700329d8a35e70a1 - -Fix issue with earlier path-check (fixes "make check") ---- - -diff --git a/receiver.c b/receiver.c -index 9c46242..75cb00d 100644 ---- a/receiver.c -+++ b/receiver.c -@@ -574,15 +574,15 @@ int recv_files(int f_in, int f_out, char *local_name) - file = dir_flist->files[cur_flist->parent_ndx]; - fname = local_name ? local_name : f_name(file, fbuf); - -- if (daemon_filter_list.head -- && check_filter(&daemon_filter_list, FLOG, fname, 0) < 0) { -+ if (DEBUG_GTE(RECV, 1)) -+ rprintf(FINFO, "recv_files(%s)\n", fname); -+ -+ if (daemon_filter_list.head && (*fname != '.' || fname[1] != '\0') -+ && check_filter(&daemon_filter_list, FLOG, fname, 0) < 0) { - rprintf(FERROR, "attempt to hack rsync failed.\n"); - exit_cleanup(RERR_PROTOCOL); - } - -- if (DEBUG_GTE(RECV, 1)) -- rprintf(FINFO, "recv_files(%s)\n", fname); -- - #ifdef SUPPORT_XATTRS - if (preserve_xattrs && iflags & ITEM_REPORT_XATTR && do_xfers - && !(want_xattr_optim && BITS_SET(iflags, ITEM_XNAME_FOLLOWS|ITEM_LOCAL_CHANGE))) diff --git a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17433.patch b/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17433.patch deleted file mode 100644 index 0ab8de1fce3b..000000000000 --- a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17433.patch +++ /dev/null @@ -1,39 +0,0 @@ -From 3e06d40029cfdce9d0f73d87cfd4edaf54be9c51 Mon Sep 17 00:00:00 2001 -From: Jeriko One <jeriko.one@gmx.us> -Date: Thu, 2 Nov 2017 23:44:19 -0700 -Subject: [PATCH] Check fname in recv_files sooner. - ---- - receiver.c | 12 ++++++------ - 1 file changed, 6 insertions(+), 6 deletions(-) - -Index: rsync-3.1.2/receiver.c -=================================================================== ---- rsync-3.1.2.orig/receiver.c -+++ rsync-3.1.2/receiver.c -@@ -580,6 +580,12 @@ int recv_files(int f_in, int f_out, char - file = dir_flist->files[cur_flist->parent_ndx]; - fname = local_name ? local_name : f_name(file, fbuf); - -+ if (daemon_filter_list.head -+ && check_filter(&daemon_filter_list, FLOG, fname, 0) < 0) { -+ rprintf(FERROR, "attempt to hack rsync failed.\n"); -+ exit_cleanup(RERR_PROTOCOL); -+ } -+ - if (DEBUG_GTE(RECV, 1)) - rprintf(FINFO, "recv_files(%s)\n", fname); - -@@ -651,12 +657,6 @@ int recv_files(int f_in, int f_out, char - - cleanup_got_literal = 0; - -- if (daemon_filter_list.head -- && check_filter(&daemon_filter_list, FLOG, fname, 0) < 0) { -- rprintf(FERROR, "attempt to hack rsync failed.\n"); -- exit_cleanup(RERR_PROTOCOL); -- } -- - if (read_batch) { - int wanted = redoing - ? we_want_redo(ndx) diff --git a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17434-part1.patch b/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17434-part1.patch deleted file mode 100644 index aeb8c2ee33cb..000000000000 --- a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17434-part1.patch +++ /dev/null @@ -1,22 +0,0 @@ -From 5509597decdbd7b91994210f700329d8a35e70a1 Mon Sep 17 00:00:00 2001 -From: Jeriko One <jeriko.one@gmx.us> -Date: Thu, 16 Nov 2017 17:26:03 -0800 -Subject: [PATCH] Check daemon filter against fnamecmp in recv_files(). - ---- - receiver.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -Index: rsync-3.1.2/receiver.c -=================================================================== ---- rsync-3.1.2.orig/receiver.c -+++ rsync-3.1.2/receiver.c -@@ -728,7 +728,7 @@ int recv_files(int f_in, int f_out, char - break; - } - if (!fnamecmp || (daemon_filter_list.head -- && check_filter(&daemon_filter_list, FLOG, fname, 0) < 0)) { -+ && check_filter(&daemon_filter_list, FLOG, fnamecmp, 0) < 0)) { - fnamecmp = fname; - fnamecmp_type = FNAMECMP_FNAME; - } diff --git a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17434-part2.patch b/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17434-part2.patch deleted file mode 100644 index 5b94efa0c1a8..000000000000 --- a/net-misc/rsync/files/rsync-3.1.2-CVE-2017-17434-part2.patch +++ /dev/null @@ -1,33 +0,0 @@ -From 70aeb5fddd1b2f8e143276f8d5a085db16c593b9 Mon Sep 17 00:00:00 2001 -From: Jeriko One <jeriko.one@gmx.us> -Date: Thu, 16 Nov 2017 17:05:42 -0800 -Subject: [PATCH] Sanitize xname in read_ndx_and_attrs. - ---- - rsync.c | 6 ++++++ - 1 file changed, 6 insertions(+) - -Index: rsync-3.1.2/rsync.c -=================================================================== ---- rsync-3.1.2.orig/rsync.c -+++ rsync-3.1.2/rsync.c -@@ -50,6 +50,7 @@ extern int flist_eof; - extern int file_old_total; - extern int keep_dirlinks; - extern int make_backups; -+extern int sanitize_paths; - extern struct file_list *cur_flist, *first_flist, *dir_flist; - extern struct chmod_mode_struct *daemon_chmod_modes; - #ifdef ICONV_OPTION -@@ -397,6 +398,11 @@ int read_ndx_and_attrs(int f_in, int f_o - if (iflags & ITEM_XNAME_FOLLOWS) { - if ((len = read_vstring(f_in, buf, MAXPATHLEN)) < 0) - exit_cleanup(RERR_PROTOCOL); -+ -+ if (sanitize_paths) { -+ sanitize_path(buf, buf, "", 0, SP_DEFAULT); -+ len = strlen(buf); -+ } - } else { - *buf = '\0'; - len = -1; |