1 From 147018e729e7c22eeabf15b82d26e4bf68a0d18e Mon Sep 17 00:00:00 2001
2 From: Alexander Cherepanov <cherepan@mccme.ru>
3 Date: Sun, 28 Dec 2014 19:57:19 +0300
4 Subject: [PATCH] libelf: Fix dir traversal vuln in ar extraction.
6 Upstream-Status: Backport
8 read_long_names terminates names at the first '/' found but then skips
9 one character without checking (it's supposed to be '\n'). Hence the
10 next name could start with any character including '/'. This leads to
11 a directory traversal vulnerability at the time the contents of the
14 The danger is mitigated by the fact that only one '/' is possible in a
15 resulting filename and only in the leading position. Hence only files
16 in the root directory can be written via this vuln and only when ar is
19 The fix for the vuln is to not skip any characters while looking
22 Signed-off-by: Alexander Cherepanov <cherepan@mccme.ru>
24 libelf/ChangeLog | 5 +++++
25 libelf/elf_begin.c | 5 +----
26 2 files changed, 6 insertions(+), 4 deletions(-)
28 diff --git a/libelf/ChangeLog b/libelf/ChangeLog
29 index 3b88d03..447c354 100644
30 --- a/libelf/ChangeLog
31 +++ b/libelf/ChangeLog
33 +2014-12-28 Alexander Cherepanov <cherepan@mccme.ru>
35 + * elf_begin.c (read_long_names): Don't miss '/' right after
36 + another '/'. Fixes a dir traversal vuln in ar extraction.
38 2014-12-18 Ulrich Drepper <drepper@gmail.com>
40 * Makefile.am: Suppress output of textrel_check command.
41 diff --git a/libelf/elf_begin.c b/libelf/elf_begin.c
42 index 30abe0b..cd3756c 100644
43 --- a/libelf/elf_begin.c
44 +++ b/libelf/elf_begin.c
45 @@ -749,10 +749,7 @@ read_long_names (Elf *elf)
48 /* NUL-terminate the string. */
51 - /* Skip the NUL byte and the \012. */
55 /* A sanity check. Somebody might have generated invalid