Matej Cepl
793c3bb790
(CVE-2019-20907, bpo#39017) avoiding possible infinite loop in specifically crafted tarball. Add recursion.tar as a testing tarball for the patch. - Provide the newest setuptools wheel (bsc#1176262, CVE-2019-20916) in their correct form (bsc#1180686). - Add CVE-2020-26116-httplib-header-injection.patch fixing bsc#1177211 (CVE-2020-26116, bpo#39603) no longer allowing special characters in the method parameter of HTTPConnection.putrequest in httplib, stopping injection of headers. Such characters now raise ValueError. - bsc#1155094 (CVE-2019-18348) Disallow control characters in hostnames in http.client. Such potentially malicious header injection URLs now cause a InvalidURL to be raised. - bsc#1109847 (CVE-2018-14647): add CVE-2018-14647_XML_SetHashSalt-in_elementtree.patch fixing bpo-34623. fixing bpo-35746 (CVE-2019-5010). OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:Factory/python?expand=0&rev=304
43 lines
1.8 KiB
Diff
43 lines
1.8 KiB
Diff
From 1fa6ef2bc7cee1c8e088dd8b397d9b2d54036dbc Mon Sep 17 00:00:00 2001
|
|
From: Rajarishi Devarajan <rishi93dev@gmail.com>
|
|
Date: Sun, 12 Jul 2020 23:47:42 +0200
|
|
Subject: [PATCH 1/4] bpo-39017 Fix infinite loop in the tarfile module
|
|
|
|
Add a check for length = 0 in the _proc_pax function to avoid running into an infinite loop
|
|
---
|
|
Lib/tarfile.py | 2 ++
|
|
Lib/test/test_tarfile.py | 5 +++++
|
|
Misc/NEWS.d/next/Library/2020-07-12-22-16-58.bpo-39017.x3Cg-9.rst | 1 +
|
|
3 files changed, 8 insertions(+)
|
|
create mode 100644 Lib/test/recursion.tar
|
|
|
|
--- a/Lib/tarfile.py
|
|
+++ b/Lib/tarfile.py
|
|
@@ -1400,6 +1400,8 @@ class TarInfo(object):
|
|
|
|
length, keyword = match.groups()
|
|
length = int(length)
|
|
+ if length == 0:
|
|
+ raise InvalidHeaderError("invalid header")
|
|
value = buf[match.end(2) + 1:match.start(1) + length - 1]
|
|
|
|
keyword = keyword.decode("utf8")
|
|
--- a/Lib/test/test_tarfile.py
|
|
+++ b/Lib/test/test_tarfile.py
|
|
@@ -321,6 +321,11 @@ class CommonReadTest(ReadTest):
|
|
with self.assertRaisesRegexp(tarfile.ReadError, "unexpected end of data"):
|
|
tar.extractfile(t).read()
|
|
|
|
+ def test_length_zero_header(self):
|
|
+ # bpo-39017 (CVE-2019-20907): reading a zero-length header should fail
|
|
+ # with an exception
|
|
+ self.assertRaises(tarfile.ReadError, tarfile.open, test_support.findfile('recursion.tar'))
|
|
+
|
|
|
|
class MiscReadTest(CommonReadTest):
|
|
taropen = tarfile.TarFile.taropen
|
|
--- /dev/null
|
|
+++ b/Misc/NEWS.d/next/Library/2020-07-12-22-16-58.bpo-39017.x3Cg-9.rst
|
|
@@ -0,0 +1 @@
|
|
+Avoid infinite loop when reading specially crafted TAR files using the tarfile module (CVE-2019-20907).
|