diff options
author | V3n3RiX <venerix@koprulu.sector> | 2023-01-13 17:49:19 +0000 |
---|---|---|
committer | V3n3RiX <venerix@koprulu.sector> | 2023-01-13 17:49:19 +0000 |
commit | 06bb974d894b86598af155dc76a6fbd76c4fa30c (patch) | |
tree | 363e323b416b8141cedf7b17e890e743d41c4c8a /app-arch | |
parent | e45f0df9d7f9f5260e69235b8c7c6e00153747f0 (diff) |
gentoo auto-resync : 13:01:2023 - 17:49:18
Diffstat (limited to 'app-arch')
-rw-r--r-- | app-arch/Manifest.gz | bin | 16897 -> 16899 bytes | |||
-rw-r--r-- | app-arch/csnappy/Manifest | 2 | ||||
-rw-r--r-- | app-arch/csnappy/csnappy-0_pre20220804.ebuild | 2 | ||||
-rw-r--r-- | app-arch/upx/Manifest | 3 | ||||
-rw-r--r-- | app-arch/upx/files/upx-4.0.1-CVE-2023-23456.patch | 61 | ||||
-rw-r--r-- | app-arch/upx/files/upx-4.0.1-CVE-2023-23457.patch | 45 | ||||
-rw-r--r-- | app-arch/upx/upx-4.0.1-r1.ebuild | 35 |
7 files changed, 146 insertions, 2 deletions
diff --git a/app-arch/Manifest.gz b/app-arch/Manifest.gz Binary files differindex e676cda4053c..ff4c4392f8ba 100644 --- a/app-arch/Manifest.gz +++ b/app-arch/Manifest.gz diff --git a/app-arch/csnappy/Manifest b/app-arch/csnappy/Manifest index 207c8da47fd5..7eb64fcc9803 100644 --- a/app-arch/csnappy/Manifest +++ b/app-arch/csnappy/Manifest @@ -1,4 +1,4 @@ AUX csnappy-0_pre20220804-fix-tests.patch 2008 BLAKE2B 4d6715a5f22018635cf9d4ab59b059b62c5be9643ac7613cb1de4bacb85039072f53a989b2c7e39ec6733bf9e30fedf59544b1ba5a27c9025ec18eb6251e3aa8 SHA512 e6bd51d21ca9a8feb9ea128289572c1ccc35dc32ef13c36248337ca031685874dd76aff180ea7a8bd01869a5235c6ce2ec744aa54e4dd8c6c6fd09df6b668861 DIST csnappy-0_pre20220804.tar.gz 594988 BLAKE2B ce82ef7945ba3110d0d2878d4fcd3d48631f260dad94c1b40f7811de17e60568b2934d33e43966f559b0d840f5eed659bde84eab46954679754e9de5306508a1 SHA512 53f602c58a3a9932ac580412d90f3aa7f820cb9bbc9e2dec240dd28de55210fd17ac61a5f8e4a2cebffe2914837c7cabba1061536abd96e35da57c799e8ee7b7 -EBUILD csnappy-0_pre20220804.ebuild 1176 BLAKE2B aa44fd13949b652522878bcdc3bb5296e930ed9704b2d477b6ef56c5077449b468b7c8ce59a2efeaf95df9e395f137f1a83806578ace5653120e63baff783839 SHA512 3ec50ec14ee66b21081dda8257f8af001db4efdfdf1f40fd87d1e5ba9748b5d20cab1e272115eb7b10428a200bb98da88807d3bb4a04c5b82fc9ce6de3bbafc1 +EBUILD csnappy-0_pre20220804.ebuild 1175 BLAKE2B c68d695e65dd5cb8c0bd78cb5f193a550000f7470f1265ad58c174e83c13c3d97421b679863daaac3af24932c350199f8807a651d4d0793d060b8b7302eeaadc SHA512 1961659473f63fc8068b51e295fef7f2628aaf425685a52ab3eb9cf594835ec531bc3306e1a268554f82e6acd6dde8ec36259be5e2f843cfef45cecf43377fed MISC metadata.xml 318 BLAKE2B ea1a70433187f4d4b5c9d7d66e7c7360bb4b509bbc2dc4dc0d619b7e84bf7ed68384093b8beb85b8ce5199a6193009d1c4b61a9e5c9141a1908c10ef616fe8ea SHA512 cb8eae4d09adf7837f423c8eb7fee010b2287bd3b4a798d1322f9f69ea538e662ab3bd3ca70603316410728ba3626a9e97ae5b73c61789d466aa2a0ebc9853bf diff --git a/app-arch/csnappy/csnappy-0_pre20220804.ebuild b/app-arch/csnappy/csnappy-0_pre20220804.ebuild index 5a67351c1ba7..4e2334f7054e 100644 --- a/app-arch/csnappy/csnappy-0_pre20220804.ebuild +++ b/app-arch/csnappy/csnappy-0_pre20220804.ebuild @@ -16,7 +16,7 @@ S="${WORKDIR}"/${PN}-${MY_COMMIT} LICENSE="BSD" # 0/${PV} b/c of the SONAME situation (see below). SLOT="0/${PV}" -KEYWORDS="amd64 ~ia64 ppc ppc64 ~sparc x86" +KEYWORDS="amd64 ~ia64 ppc ppc64 sparc x86" # https://github.com/zeevt/csnappy/issues/33 # No SONAME yet. diff --git a/app-arch/upx/Manifest b/app-arch/upx/Manifest index bf74f3b944c6..16102b59b5fe 100644 --- a/app-arch/upx/Manifest +++ b/app-arch/upx/Manifest @@ -1,5 +1,8 @@ +AUX upx-4.0.1-CVE-2023-23456.patch 2336 BLAKE2B 5ab0455eecf634ce7806079931f06b6b62136a03682f76794f60bf50d120ab9fb28ed35997191c8b47b8473f9b563bfca67bee6d75366625d29b28c2a1544c2b SHA512 7dd4ab0c5fbf66ff2b57457c6d1afb2f99f1c2f8fa61ef8f8fb560832c8455af03875a6a56d6a5dc29893be06d6dab689c7f9d2a0fe0ace6e1b01101e666f979 +AUX upx-4.0.1-CVE-2023-23457.patch 2119 BLAKE2B eed7ea0ff6de7ebca9ac0bceaa74e4c6d975a22228c23523ffeb79f6852df7ff0d451fd1e01cbf11a40cf62a5e8395f621429d0c7f9aa9da432f1d80d68c20bc SHA512 2d32f36abcab77f7aeb6adc269d2feffdfeae15460591f3c2b60a732c0b919354f020b88d4ea0e43c7559d02be248ac4949c44a357bef7b19f3277deaa692b91 DIST upx-4.0.0-src.tar.xz 1159308 BLAKE2B d2626a63b626f9b4e913b822e699fa93b7080d322b19555d44d7cf4ce17b37f0d50ec1381d07d0e4f8827e8edcd29d525d497fa79acd18d520ac58e176fb2b72 SHA512 fe3e8c594e845a91338b1e11fe3cb6371430af40a567187d63835e27da8b2abf993a104b0693063f4db984234bada7b2bd16ad79e3ad90861a1f495d99de7de6 DIST upx-4.0.1-src.tar.xz 1154032 BLAKE2B 0da23cedf73506e06e5dcf19ab0d194d8e578188bb4d75e760fe3f7dc7f24a9d42ff4b75fd9514162f48ae7cfad347b5bd65789805071354a74129960807843b SHA512 f2e42c83fd4a0d273a20c8b0f0d1eb201edcd1f10c779d2a6e8ac0812741c3af0c887382e54894190ecc4c7002a910524b2ed79ae7a7b595b8392598ad2e1235 EBUILD upx-4.0.0.ebuild 651 BLAKE2B 79aca51cc6fa40e8a39fecd5d512cd191d9981c3e584ab18629c52253d036fd52802476f24060c40117273853d7862c6359c47d8da69732402c89cf2e7c07398 SHA512 168ee21480b5b065f0ec20b3a6916a479db25a358b4a7894d7bdccad4a2505fe12d975ee363b8a687fe0f395e5a07f12d3fc44eb0eacae5bbbe087cfbc4e259c +EBUILD upx-4.0.1-r1.ebuild 845 BLAKE2B 02bd9f1f9afe52d583b04b6216ccc70e5a06ba29c5ff6ebc7e0f133027add7e01835bb3ae624b910bd07c37b2792ce46f4f9320e52e93dfa761828c0d2e49a8c SHA512 893e4cde35c443806f9e4a16f465cfe9b094e7309c797b317c0bf5f22ac5281c9b2a2a2ec050786e696165b2e5474743e36af4e723ea5671f43dcfaf48e9ec62 EBUILD upx-4.0.1.ebuild 748 BLAKE2B e4562c894bd26240bb21dc4e579aa56c9c6bf27ef1fd00b6c30da6739cea4458a9de9154a7b1bcf5efa4f5fbd01fe595126f48f593ea2c8b336cc1cec84b3343 SHA512 93e947ff8f3794c0e61637e2587dc9acba3ce6f27024c8f1e9729fa4f915eec7467a62a70694c3d23fb2dbc10e9f5f115cbe9831899df2b77ecc8d4fffec15a6 MISC metadata.xml 479 BLAKE2B fafbeeb827ba16ec14c3682982e7cbb1ef9264b637086d58aca32a632b1f273f1cc7ede069d61439a498f04e09368e4095829de7dd95b17afafc80f7ceb15695 SHA512 956e31235fec93e773f9bdbe62de739e3994d92b3a56ea97f65db5b20f182f4fbeed62370a28bf98447fddfa89efec4b8b4d63daf9020210810bd8bb201534e4 diff --git a/app-arch/upx/files/upx-4.0.1-CVE-2023-23456.patch b/app-arch/upx/files/upx-4.0.1-CVE-2023-23456.patch new file mode 100644 index 000000000000..779800a08e40 --- /dev/null +++ b/app-arch/upx/files/upx-4.0.1-CVE-2023-23456.patch @@ -0,0 +1,61 @@ +From 1d291ff0db8a056600ebdebb9c3c62d700eaa842 Mon Sep 17 00:00:00 2001 +From: John Reiser <jreiser@BitWagon.com> +Date: Thu, 24 Nov 2022 10:28:03 -0800 +Subject: [PATCH] p_tmt: more sanity of input, cleanup MemBuffer usage + +https://github.com/upx/upx/issues/632 + modified: src/p_tmt.cpp +--- + src/p_tmt.cpp | 23 +++++++++++------------ + 1 file changed, 11 insertions(+), 12 deletions(-) + +diff --git a/src/p_tmt.cpp b/src/p_tmt.cpp +index 7dc72888..592809a9 100644 +--- a/src/p_tmt.cpp ++++ b/src/p_tmt.cpp +@@ -173,15 +173,13 @@ int PackTmt::readFileHeader() + fi->seek(adam_offset,SEEK_SET); + fi->readx(&ih,sizeof(ih)); + // FIXME: should add more checks for the values in 'ih' +- unsigned const imagesize = get_le32(&ih.imagesize); +- unsigned const entry = get_le32(&ih.entry); +- unsigned const relocsize = get_le32(&ih.relocsize); +- if (!imagesize +- || file_size <= imagesize +- || file_size <= entry +- || file_size <= relocsize) { +- printWarn(getName(), "bad header; imagesize=%#x entry=%#x relocsize=%#x", +- imagesize, entry, relocsize); ++ unsigned const imagesize = ih.imagesize; ++ unsigned const entry = ih.entry; ++ unsigned const relocsize = ih.relocsize; ++ if (imagesize < sizeof(ih) || entry < sizeof(ih) || file_size <= imagesize || ++ file_size <= entry || file_size <= relocsize) { ++ printWarn(getName(), "bad header; imagesize=%#x entry=%#x relocsize=%#x", imagesize, ++ entry, relocsize); + return 0; + } + +@@ -215,15 +213,16 @@ void PackTmt::pack(OutputFile *fo) + ibuf.alloc(usize+rsize+128); + obuf.allocForCompression(usize+rsize+128); + +- MemBuffer wrkmem; +- wrkmem.alloc(rsize+EXTRA_INFO); // relocations ++ MemBuffer mb_wrkmem; ++ mb_wrkmem.alloc(rsize + EXTRA_INFO + 4); // relocations + original entry point + relocsize ++ SPAN_S_VAR(upx_byte, wrkmem, mb_wrkmem); + + fi->seek(adam_offset+sizeof(ih),SEEK_SET); + fi->readx(ibuf,usize); + fi->readx(wrkmem+4,rsize); + const unsigned overlay = file_size - fi->tell(); + +- if (find_le32(ibuf,128,get_le32("UPX ")) >= 0) ++ if (find_le32(ibuf, UPX_MIN(128u, usize), get_le32("UPX ")) >= 0) + throwAlreadyPacked(); + if (rsize == 0) + throwCantPack("file is already compressed with another packer"); +-- +2.38.2 + diff --git a/app-arch/upx/files/upx-4.0.1-CVE-2023-23457.patch b/app-arch/upx/files/upx-4.0.1-CVE-2023-23457.patch new file mode 100644 index 000000000000..8cb8455b4eab --- /dev/null +++ b/app-arch/upx/files/upx-4.0.1-CVE-2023-23457.patch @@ -0,0 +1,45 @@ +From 779b648c5f6aa9b33f4728f79dd4d0efec0bf860 Mon Sep 17 00:00:00 2001 +From: John Reiser <jreiser@BitWagon.com> +Date: Wed, 23 Nov 2022 19:49:28 -0800 +Subject: [PATCH] invert_pt_dynamic: fix thinko; PackLinuxElf64help1 insist on + ELF + +https://github.com/upx/upx/issues/631 + modified: src/p_lx_elf.cpp +--- + src/p_lx_elf.cpp | 8 +++++--- + 1 file changed, 5 insertions(+), 3 deletions(-) + +diff --git a/src/p_lx_elf.cpp b/src/p_lx_elf.cpp +index fa55470f7..b698ee0a2 100644 +--- a/src/p_lx_elf.cpp ++++ b/src/p_lx_elf.cpp +@@ -256,7 +256,8 @@ PackLinuxElf32::PackLinuxElf32help1(InputFile *f) + e_phnum = get_te16(&ehdri.e_phnum); + e_shnum = get_te16(&ehdri.e_shnum); + unsigned const e_phentsize = get_te16(&ehdri.e_phentsize); +- if (ehdri.e_ident[Elf32_Ehdr::EI_CLASS]!=Elf32_Ehdr::ELFCLASS32 ++ if (memcmp((char const *)&ehdri, "\x7f\x45\x4c\x46", 4) // "\177ELF" ++ || ehdri.e_ident[Elf32_Ehdr::EI_CLASS]!=Elf32_Ehdr::ELFCLASS32 + || sizeof(Elf32_Phdr) != e_phentsize + || (Elf32_Ehdr::ELFDATA2MSB == ehdri.e_ident[Elf32_Ehdr::EI_DATA] + && &N_BELE_RTP::be_policy != bele) +@@ -761,7 +762,8 @@ PackLinuxElf64::PackLinuxElf64help1(InputFile *f) + e_phnum = get_te16(&ehdri.e_phnum); + e_shnum = get_te16(&ehdri.e_shnum); + unsigned const e_phentsize = get_te16(&ehdri.e_phentsize); +- if (ehdri.e_ident[Elf64_Ehdr::EI_CLASS]!=Elf64_Ehdr::ELFCLASS64 ++ if (memcmp((char const *)&ehdri, "\x7f\x45\x4c\x46", 4) // "\177ELF" ++ || ehdri.e_ident[Elf64_Ehdr::EI_CLASS]!=Elf64_Ehdr::ELFCLASS64 + || sizeof(Elf64_Phdr) != e_phentsize + || (Elf64_Ehdr::ELFDATA2MSB == ehdri.e_ident[Elf64_Ehdr::EI_DATA] + && &N_BELE_RTP::be_policy != bele) +@@ -5780,7 +5782,7 @@ PackLinuxElf64::invert_pt_dynamic(Elf64_Dyn const *dynp, upx_uint64_t headway) + } + if (file_size <= dt_offsets[n_off]) { + char msg[60]; snprintf(msg, sizeof(msg), "bad DT_{%#x} = %#x (beyond EOF)", +- dt_names[k], dt_offsets[n_off]); ++ k, dt_offsets[n_off]); + throwCantPack(msg); + } + n_off += !!dt_offsets[n_off]; diff --git a/app-arch/upx/upx-4.0.1-r1.ebuild b/app-arch/upx/upx-4.0.1-r1.ebuild new file mode 100644 index 000000000000..a1f1b77dd66d --- /dev/null +++ b/app-arch/upx/upx-4.0.1-r1.ebuild @@ -0,0 +1,35 @@ +# Copyright 1999-2023 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit cmake + +DESCRIPTION="Ultimate Packer for eXecutables (free version using UCL compression and not NRV)" +HOMEPAGE="https://upx.github.io/" +SRC_URI="https://github.com/upx/upx/releases/download/v${PV}/${P}-src.tar.xz" +S="${WORKDIR}/${P}-src" + +LICENSE="GPL-2+ UPX-exception" # Read the exception before applying any patches +SLOT="0" +KEYWORDS="~amd64 ~arm ~arm64 ~ppc ~ppc64 ~sparc ~x86" + +RDEPEND="!app-arch/upx-bin" +BDEPEND="app-arch/xz-utils[extra-filters]" + +PATCHES=( + "${FILESDIR}/${P}-CVE-2023-23456.patch" + "${FILESDIR}/${P}-CVE-2023-23457.patch" +) + +src_configure() { + local mycmakeargs=( + -DUPX_CONFIG_DISABLE_WERROR=ON + ) + cmake_src_configure +} + +src_test() { + # Don't run tests in parallel, #878977 + cmake_src_test -j1 +} |