Blame SOURCES/fribidi-CVE-2022-25308.patch

e39505
From ad3a19e6372b1e667128ed1ea2f49919884587e1 Mon Sep 17 00:00:00 2001
e39505
From: Akira TAGOH <akira@tagoh.org>
e39505
Date: Thu, 17 Feb 2022 17:30:12 +0900
e39505
Subject: [PATCH 1/4] Fix the stack buffer overflow issue
e39505
e39505
strlen() could returns 0. Without a conditional check for len,
e39505
accessing S_ pointer with len - 1 may causes a stack buffer overflow.
e39505
e39505
AddressSanitizer reports this like:
e39505
==1219243==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffdce043c1f at pc 0x000000403547 bp 0x7ffdce0
e39505
43b30 sp 0x7ffdce043b28
e39505
READ of size 1 at 0x7ffdce043c1f thread T0
e39505
    #0 0x403546 in main ../bin/fribidi-main.c:393
e39505
    #1 0x7f226804e58f in __libc_start_call_main (/lib64/libc.so.6+0x2d58f)
e39505
    #2 0x7f226804e648 in __libc_start_main_impl (/lib64/libc.so.6+0x2d648)
e39505
    #3 0x4036f4 in _start (/tmp/fribidi/build/bin/fribidi+0x4036f4)
e39505
e39505
Address 0x7ffdce043c1f is located in stack of thread T0 at offset 63 in frame
e39505
    #0 0x4022bf in main ../bin/fribidi-main.c:193
e39505
e39505
  This frame has 5 object(s):
e39505
    [32, 36) 'option_index' (line 233)
e39505
    [48, 52) 'base' (line 386)
e39505
    [64, 65064) 'S_' (line 375) <== Memory access at offset 63 underflows this variable
e39505
    [65328, 130328) 'outstring' (line 385)
e39505
    [130592, 390592) 'logical' (line 384)
e39505
e39505
This fixes https://github.com/fribidi/fribidi/issues/181
e39505
---
e39505
 bin/fribidi-main.c | 2 +-
e39505
 1 file changed, 1 insertion(+), 1 deletion(-)
e39505
e39505
diff --git a/bin/fribidi-main.c b/bin/fribidi-main.c
e39505
index 3cf9fe1..3ae4fb6 100644
e39505
--- a/bin/fribidi-main.c
e39505
+++ b/bin/fribidi-main.c
e39505
@@ -390,7 +390,7 @@ FRIBIDI_END_IGNORE_DEPRECATIONS
e39505
 	    S_[sizeof (S_) - 1] = 0;
e39505
 	    len = strlen (S_);
e39505
 	    /* chop */
e39505
-	    if (S_[len - 1] == '\n')
e39505
+	    if (len > 0 && S_[len - 1] == '\n')
e39505
 	      {
e39505
 		len--;
e39505
 		S_[len] = '\0';
e39505
-- 
e39505
2.35.1
e39505