CVE-2015-8865.patch 957 B

123456789101112131415161718192021222324252627
  1. From: Markus Koschany <apo@debian.org>
  2. Date: Sat, 7 May 2016 15:13:04 +0200
  3. Subject: CVE-2015-8865
  4. A malformed magic file can trigger a segmentation fault due to a buffer
  5. over-write in the file_check_mem function.
  6. Origin: https://bugs.php.net/bug.php?id=71527 (Original bug report)
  7. Origin: http://bugs.gw.com/view.php?id=522 (bug report for file)
  8. Origin: https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 (patch)
  9. ---
  10. src/funcs.c | 2 +-
  11. 1 file changed, 1 insertion(+), 1 deletion(-)
  12. diff --git a/src/funcs.c b/src/funcs.c
  13. index e7d2bb8..0ed90ef 100644
  14. --- a/src/funcs.c
  15. +++ b/src/funcs.c
  16. @@ -410,7 +410,7 @@ file_check_mem(struct magic_set *ms, unsigned int level)
  17. size_t len;
  18. if (level >= ms->c.len) {
  19. - len = (ms->c.len += 20) * sizeof(*ms->c.li);
  20. + len = (ms->c.len = 20 + level) * sizeof(*ms->c.li);
  21. ms->c.li = CAST(struct level_info *, (ms->c.li == NULL) ?
  22. malloc(len) :
  23. realloc(ms->c.li, len));