* [bug#31487] [PATCH] gnu: Add upx. @ 2018-05-17 22:51 Pierre Neidhardt 2018-05-18 6:46 ` Pierre Neidhardt ` (2 more replies) 0 siblings, 3 replies; 12+ messages in thread From: Pierre Neidhardt @ 2018-05-17 22:51 UTC (permalink / raw) To: 31487 * gnu/packages/compression.scm (ucl): New variable. * gnu/packages/compression.scm (upx): New variable. --- gnu/packages/compression.scm | 73 ++++++++++++++++++++++++++++++++++++ 1 file changed, 73 insertions(+) diff --git a/gnu/packages/compression.scm b/gnu/packages/compression.scm index 562a2bf8b..b0d7cd971 100644 --- a/gnu/packages/compression.scm +++ b/gnu/packages/compression.scm @@ -2151,3 +2151,76 @@ with @code{deflate} but offers more dense compression. The specification of the Brotli Compressed Data Format is defined in RFC 7932.") (license license:expat))) + +(define-public ucl + (package + (name "ucl") + (version "1.03") + (source (origin + (method url-fetch) + (uri (string-append "http://www.oberhumer.com/opensource/" + name "/download/" name "-" version ".tar.gz")) + (sha256 + (base32 + "0j036lkwsxvm15gr29n8wn07cqq79dswjs9k54939ms5zngjjrdq")))) + (build-system gnu-build-system) + (home-page "http://www.oberhumer.com/opensource/ucl/") + (synopsis "Portable lossless data compression library") + (description "UCL implements a number of compression algorithms that +achieve an excellent compression ratio while allowing *very* fast +decompression. Decompression requires no additional memory. + +UCL is an OpenSource re-implementation of some NRV compression algorithms. + +As compared to LZO, the UCL algorithms achieve a better compression ratio but +decompression is a little bit slower. See below for some rough timings.") + (license license:gpl2))) + +(define-public upx + (package + (name "upx") + (version "3.94") + (source (origin + (method url-fetch) + (uri (string-append "https://github.com/upx/upx/releases/download/v" + version "/" name "-" version "-src.tar.xz")) + (sha256 + (base32 + "08anybdliqsbsl6x835iwzljahnm9i7v26icdjkcv33xmk6p5vw1")))) + (build-system gnu-build-system) + (native-inputs `(("zlib" ,zlib) + ("perl" ,perl) + ("ucl" ,ucl))) + (arguments + `(#:make-flags + (list "all" + ;; CHECK_WHITESPACE does not seem to work. + ;; See https://git.archlinux.org/svntogit/community.git/tree/trunk/PKGBUILD?h=packages/upx. + "CHECK_WHITESPACE=true") + #:phases + (modify-phases %standard-phases + (delete 'configure) + (delete 'check) + (delete 'install) + (add-before 'build 'patch-exec-bin-sh + (lambda _ + (substitute* (find-files "Makefile") + (("/bin/sh") (which "sh"))) + (substitute* "src/Makefile" + (("/bin/sh") (which "sh"))) + #t)) + (add-after 'build 'install-upx + (lambda* (#:key outputs #:allow-other-keys) + (let* ((out (assoc-ref outputs "out")) + (bin (string-append out "/bin"))) + (mkdir-p bin) + (copy-file "src/upx.out" (string-append bin "/upx"))) + #t)) + ))) + (home-page "https://upx.github.io/") + (synopsis "The Ultimate Packer for eXecutables") + (description "UPX is an advanced executable file compressor. UPX will +typically reduce the file size of programs and DLLs by around 50%-70%, thus +reducing disk space, network load times, download times and other distribution +and storage costs.") + (license license:gpl2))) -- 2.17.0 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-05-17 22:51 [bug#31487] [PATCH] gnu: Add upx Pierre Neidhardt @ 2018-05-18 6:46 ` Pierre Neidhardt 2018-05-26 20:14 ` Ludovic Courtès 2018-06-16 14:54 ` [bug#31487] [PATCH] gnu: upx: Fix CVE-2017-15056 Pierre Neidhardt 2 siblings, 0 replies; 12+ messages in thread From: Pierre Neidhardt @ 2018-05-18 6:46 UTC (permalink / raw) To: 31487 [-- Attachment #1: Type: text/plain, Size: 73 bytes --] Forgot to add my name to the copyright list. -- Pierre Neidhardt [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 487 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-05-17 22:51 [bug#31487] [PATCH] gnu: Add upx Pierre Neidhardt 2018-05-18 6:46 ` Pierre Neidhardt @ 2018-05-26 20:14 ` Ludovic Courtès 2018-05-27 13:46 ` Pierre Neidhardt 2018-06-16 14:54 ` [bug#31487] [PATCH] gnu: upx: Fix CVE-2017-15056 Pierre Neidhardt 2 siblings, 1 reply; 12+ messages in thread From: Ludovic Courtès @ 2018-05-26 20:14 UTC (permalink / raw) To: Pierre Neidhardt; +Cc: 31487 Hello, Pierre Neidhardt <ambrevar@gmail.com> skribis: > * gnu/packages/compression.scm (ucl): New variable. > * gnu/packages/compression.scm (upx): New variable. I committed both as separate patches (the convention is to have one patch per package), slightly changed descriptions to remove “marketing speak”, and changed licenses to ‘gpl2+’ after checking the source file headers. There’s one issue left though: $ ./pre-inst-env guix lint upx gnu/packages/compression.scm:2179:2: upx@3.94: probably vulnerable to CVE-2017-15056, CVE-2017-16869 Could you check whether patches are available for these? Better be safe than sorry! Thank you, Ludo’. ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-05-26 20:14 ` Ludovic Courtès @ 2018-05-27 13:46 ` Pierre Neidhardt 2018-05-28 7:55 ` Ludovic Courtès 0 siblings, 1 reply; 12+ messages in thread From: Pierre Neidhardt @ 2018-05-27 13:46 UTC (permalink / raw) To: Ludovic Courtès; +Cc: 31487 [-- Attachment #1: Type: text/plain, Size: 677 bytes --] Ludovic Courtès <ludo@gnu.org> writes: > There’s one issue left though: > > $ ./pre-inst-env guix lint upx > gnu/packages/compression.scm:2179:2: upx@3.94: probably vulnerable to CVE-2017-15056, CVE-2017-16869 > > Could you check whether patches are available for these? Better be safe > than sorry! Indeed they are. They are not on the master branch though, only devel I think. So what's the protocol here? Shall we cherry-pick the fixing commits or get latest devel? -- Pierre Neidhardt The day advanced as if to light some work of mine; it was morning, and lo! now it is evening, and nothing memorable is accomplished. -- H.D. Thoreau [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 487 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-05-27 13:46 ` Pierre Neidhardt @ 2018-05-28 7:55 ` Ludovic Courtès 2018-05-29 6:42 ` Pierre Neidhardt 0 siblings, 1 reply; 12+ messages in thread From: Ludovic Courtès @ 2018-05-28 7:55 UTC (permalink / raw) To: Pierre Neidhardt; +Cc: 31487 Hi Pierre, Pierre Neidhardt <ambrevar@gmail.com> skribis: > Ludovic Courtès <ludo@gnu.org> writes: > >> There’s one issue left though: >> >> $ ./pre-inst-env guix lint upx >> gnu/packages/compression.scm:2179:2: upx@3.94: probably vulnerable to CVE-2017-15056, CVE-2017-16869 >> >> Could you check whether patches are available for these? Better be safe >> than sorry! > > Indeed they are. > They are not on the master branch though, only devel I think. > So what's the protocol here? Shall we cherry-pick the fixing commits or > get latest devel? Yes. You can add them as individual patches (see commit aa8ac0294421d465f60e18c8271f971ec8407a95 for an example); as usual, make sure each patch starts with a few lines explaining what the patch does and where it comes from (you can take the commit log for that plus a repo URL, for instance.) Then you can check that ‘guix lint upx’ is happy. TIA! Ludo’. ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-05-28 7:55 ` Ludovic Courtès @ 2018-05-29 6:42 ` Pierre Neidhardt 2018-05-29 13:27 ` Ludovic Courtès 0 siblings, 1 reply; 12+ messages in thread From: Pierre Neidhardt @ 2018-05-29 6:42 UTC (permalink / raw) To: Ludovic Courtès; +Cc: 31487 [-- Attachment #1: Type: text/plain, Size: 207 bytes --] The relevant issues: - https://github.com/upx/upx/issues/146 - https://github.com/upx/upx/pull/190 Both CVEs were rejected, so I guess there is no need to include a patch. -- Pierre Neidhardt [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 487 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-05-29 6:42 ` Pierre Neidhardt @ 2018-05-29 13:27 ` Ludovic Courtès 2018-06-15 7:12 ` Ludovic Courtès 0 siblings, 1 reply; 12+ messages in thread From: Ludovic Courtès @ 2018-05-29 13:27 UTC (permalink / raw) To: Pierre Neidhardt; +Cc: 31487 Pierre Neidhardt <ambrevar@gmail.com> skribis: > The relevant issues: > > - https://github.com/upx/upx/issues/146 > - https://github.com/upx/upx/pull/190 Hmm I see that: https://github.com/upx/upx/issues/128 corresponds to: https://nvd.nist.gov/vuln/detail?vulnId=CVE%2D%32%30%31%37%2D%31%35%30%35%36 and: https://nvd.nist.gov/vuln/detail?vulnId=CVE%2D%32%30%31%37%2D%31%36%38%36%39 corresponds to: https://github.com/upx/upx/issues/146 The latter (CVE-2017-16869) is marked as “disputed” above, and I would agree with the arguments of the UPX maintainers. The authors did not react to the former (CVE-2017-15056, crash when reading ELF files), other than by fixing it, but it does look similar in spirit. What about adding a patch for CVE-2017-15056 since it would at least fix a concrete bug? CVE-2017-16869 is also a bug but it concerns Mach-O files, which are much less of a concern for our users I suppose. Patching it wouldn’t hurt either, but you could also add a ‘lint-hidden-cve’ property for CVE-2017-16869 with a comment. TIA, Ludo’. ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-05-29 13:27 ` Ludovic Courtès @ 2018-06-15 7:12 ` Ludovic Courtès 2018-06-16 14:58 ` Pierre Neidhardt 0 siblings, 1 reply; 12+ messages in thread From: Ludovic Courtès @ 2018-06-15 7:12 UTC (permalink / raw) To: Pierre Neidhardt; +Cc: 31487 Ping! :-) ludo@gnu.org (Ludovic Courtès) skribis: > Pierre Neidhardt <ambrevar@gmail.com> skribis: > >> The relevant issues: >> >> - https://github.com/upx/upx/issues/146 >> - https://github.com/upx/upx/pull/190 > > Hmm I see that: > > https://github.com/upx/upx/issues/128 > corresponds to: > https://nvd.nist.gov/vuln/detail?vulnId=CVE%2D%32%30%31%37%2D%31%35%30%35%36 > > and: > > https://nvd.nist.gov/vuln/detail?vulnId=CVE%2D%32%30%31%37%2D%31%36%38%36%39 > corresponds to: > https://github.com/upx/upx/issues/146 > > The latter (CVE-2017-16869) is marked as “disputed” above, and I would > agree with the arguments of the UPX maintainers. > > The authors did not react to the former (CVE-2017-15056, crash when > reading ELF files), other than by fixing it, but it does look similar in > spirit. > > What about adding a patch for CVE-2017-15056 since it would at least fix > a concrete bug? > > CVE-2017-16869 is also a bug but it concerns Mach-O files, which are > much less of a concern for our users I suppose. Patching it wouldn’t > hurt either, but you could also add a ‘lint-hidden-cve’ property for > CVE-2017-16869 with a comment. > > TIA, > Ludo’. ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-06-15 7:12 ` Ludovic Courtès @ 2018-06-16 14:58 ` Pierre Neidhardt 2018-06-16 19:15 ` Pierre Neidhardt 0 siblings, 1 reply; 12+ messages in thread From: Pierre Neidhardt @ 2018-06-16 14:58 UTC (permalink / raw) To: Ludovic Courtès; +Cc: 31487 [-- Attachment #1: Type: text/plain, Size: 220 bytes --] Ludovic Courtès <ludo@gnu.org> writes: > Ping! :-) Sorry for the long delay. I've just sent a patch. I'm having issues with my development setup so I haven't been able to test it. -- Pierre Neidhardt [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 487 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: Add upx. 2018-06-16 14:58 ` Pierre Neidhardt @ 2018-06-16 19:15 ` Pierre Neidhardt 0 siblings, 0 replies; 12+ messages in thread From: Pierre Neidhardt @ 2018-06-16 19:15 UTC (permalink / raw) To: Ludovic Courtès; +Cc: 31487 [-- Attachment #1: Type: text/plain, Size: 155 bytes --] I've finally resolved issues with my Guix setup and I've successfully tested the patched version of upx. Feel free to merge. -- Pierre Neidhardt [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 487 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#31487] [PATCH] gnu: upx: Fix CVE-2017-15056. 2018-05-17 22:51 [bug#31487] [PATCH] gnu: Add upx Pierre Neidhardt 2018-05-18 6:46 ` Pierre Neidhardt 2018-05-26 20:14 ` Ludovic Courtès @ 2018-06-16 14:54 ` Pierre Neidhardt 2018-06-16 21:57 ` bug#31487: " Ludovic Courtès 2 siblings, 1 reply; 12+ messages in thread From: Pierre Neidhardt @ 2018-06-16 14:54 UTC (permalink / raw) To: 31487 * gnu/packages/patches/upx-protect-against-bad-crafted-input.patch: New file. * gnu/packages/compression.scm (upx)[source]: Use it. --- gnu/packages/compression.scm | 8 +- ...px-protect-against-bad-crafted-input.patch | 96 +++++++++++++++++++ 2 files changed, 103 insertions(+), 1 deletion(-) create mode 100644 gnu/packages/patches/upx-protect-against-bad-crafted-input.patch diff --git a/gnu/packages/compression.scm b/gnu/packages/compression.scm index 8f062049a..0be7962b3 100644 --- a/gnu/packages/compression.scm +++ b/gnu/packages/compression.scm @@ -2209,7 +2209,8 @@ decompression is a little bit slower.") version "/" name "-" version "-src.tar.xz")) (sha256 (base32 - "08anybdliqsbsl6x835iwzljahnm9i7v26icdjkcv33xmk6p5vw1")))) + "08anybdliqsbsl6x835iwzljahnm9i7v26icdjkcv33xmk6p5vw1")) + (patches (search-patches "upx-protect-against-bad-crafted-input.patch")))) (build-system gnu-build-system) (native-inputs `(("perl" ,perl) ("ucl" ,ucl))) @@ -2241,6 +2242,11 @@ decompression is a little bit slower.") #t)) ))) (home-page "https://upx.github.io/") + ;; CVE-16869 is about Mach-O files which is not of a big concern for Guix. + ;; See https://github.com/upx/upx/issues/146 and + ;; https://nvd.nist.gov/vuln/detail?vulnId=CVE%2D%32%30%31%37%2D%31%36%38%36%39. + ;; The issue will be fixed after version 3.94. + (properties `((lint-hidden-cve . ("CVE-2017-16869")))) (synopsis "Compression tool for executables") (description "The Ultimate Packer for eXecutables (UPX) is an executable file diff --git a/gnu/packages/patches/upx-protect-against-bad-crafted-input.patch b/gnu/packages/patches/upx-protect-against-bad-crafted-input.patch new file mode 100644 index 000000000..525980e73 --- /dev/null +++ b/gnu/packages/patches/upx-protect-against-bad-crafted-input.patch @@ -0,0 +1,96 @@ +From 3e0c2966dffb5dadb512a476ef4be3d0cc51c2be Mon Sep 17 00:00:00 2001 +From: Pierre Neidhardt <ambrevar@gmail.com> +Date: Sat, 16 Jun 2018 16:35:00 +0200 +Subject: [PATCH] Protect against bad crafted input + +Also check for wrap-around when checking oversize involving e_shoff and e_shnum. + +raised by https://github.com/upx/upx/pull/190 + modified: p_lx_elf.cpp +--- + src/p_lx_elf.cpp | 30 ++++++++++++++++++++++++++++++ + 1 file changed, 30 insertions(+) + +diff --git a/src/p_lx_elf.cpp b/src/p_lx_elf.cpp +index 822a7652..41e805ee 100644 +--- a/src/p_lx_elf.cpp ++++ b/src/p_lx_elf.cpp +@@ -235,8 +235,17 @@ PackLinuxElf32::PackLinuxElf32help1(InputFile *f) + sz_phdrs = 0; + return; + } ++ if (0==e_phnum) throwCantUnpack("0==e_phnum"); + e_phoff = get_te32(&ehdri.e_phoff); ++ unsigned const last_Phdr = e_phoff + e_phnum * sizeof(Elf32_Phdr); ++ if (last_Phdr < e_phoff || (unsigned long)file_size < last_Phdr) { ++ throwCantUnpack("bad e_phoff"); ++ } + e_shoff = get_te32(&ehdri.e_shoff); ++ unsigned const last_Shdr = e_shoff + e_shnum * sizeof(Elf32_Shdr); ++ if (last_Shdr < e_shoff || (unsigned long)file_size < last_Shdr) { ++ throwCantUnpack("bad e_shoff"); ++ } + sz_phdrs = e_phnum * e_phentsize; + + if (f && Elf32_Ehdr::ET_DYN!=e_type) { +@@ -599,8 +608,17 @@ PackLinuxElf64::PackLinuxElf64help1(InputFile *f) + sz_phdrs = 0; + return; + } ++ if (0==e_phnum) throwCantUnpack("0==e_phnum"); + e_phoff = get_te64(&ehdri.e_phoff); ++ upx_uint64_t const last_Phdr = e_phoff + e_phnum * sizeof(Elf64_Phdr); ++ if (last_Phdr < e_phoff || (unsigned long)file_size < last_Phdr) { ++ throwCantUnpack("bad e_phoff"); ++ } + e_shoff = get_te64(&ehdri.e_shoff); ++ upx_uint64_t const last_Shdr = e_shoff + e_shnum * sizeof(Elf64_Shdr); ++ if (last_Shdr < e_shoff || (unsigned long)file_size < last_Shdr) { ++ throwCantUnpack("bad e_shoff"); ++ } + sz_phdrs = e_phnum * e_phentsize; + + if (f && Elf64_Ehdr::ET_DYN!=e_type) { +@@ -3763,6 +3781,9 @@ void PackLinuxElf64::pack4(OutputFile *fo, Filter &ft) + + void PackLinuxElf64::unpack(OutputFile *fo) + { ++ if (e_phoff != sizeof(Elf64_Ehdr)) {// Phdrs not contiguous with Ehdr ++ throwCantUnpack("bad e_phoff"); ++ } + unsigned const c_phnum = get_te16(&ehdri.e_phnum); + upx_uint64_t old_data_off = 0; + upx_uint64_t old_data_len = 0; +@@ -3828,6 +3849,9 @@ void PackLinuxElf64::unpack(OutputFile *fo) + unsigned total_out = 0; + unsigned c_adler = upx_adler32(NULL, 0); + unsigned u_adler = upx_adler32(NULL, 0); ++ if ((MAX_ELF_HDR - sizeof(Elf64_Ehdr))/sizeof(Elf64_Phdr) < u_phnum) { ++ throwCantUnpack("bad compressed e_phnum"); ++ } + + // Packed ET_EXE has no PT_DYNAMIC. + // Packed ET_DYN has original PT_DYNAMIC for info needed by rtld. +@@ -4383,6 +4407,9 @@ Elf64_Sym const *PackLinuxElf64::elf_lookup(char const *name) const + + void PackLinuxElf32::unpack(OutputFile *fo) + { ++ if (e_phoff != sizeof(Elf32_Ehdr)) {// Phdrs not contiguous with Ehdr ++ throwCantUnpack("bad e_phoff"); ++ } + unsigned const c_phnum = get_te16(&ehdri.e_phnum); + unsigned old_data_off = 0; + unsigned old_data_len = 0; +@@ -4449,6 +4476,9 @@ void PackLinuxElf32::unpack(OutputFile *fo) + unsigned total_out = 0; + unsigned c_adler = upx_adler32(NULL, 0); + unsigned u_adler = upx_adler32(NULL, 0); ++ if ((MAX_ELF_HDR - sizeof(Elf32_Ehdr))/sizeof(Elf32_Phdr) < u_phnum) { ++ throwCantUnpack("bad compressed e_phnum"); ++ } + + // Packed ET_EXE has no PT_DYNAMIC. + // Packed ET_DYN has original PT_DYNAMIC for info needed by rtld. +-- +2.17.0 + -- 2.17.0 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* bug#31487: [PATCH] gnu: upx: Fix CVE-2017-15056. 2018-06-16 14:54 ` [bug#31487] [PATCH] gnu: upx: Fix CVE-2017-15056 Pierre Neidhardt @ 2018-06-16 21:57 ` Ludovic Courtès 0 siblings, 0 replies; 12+ messages in thread From: Ludovic Courtès @ 2018-06-16 21:57 UTC (permalink / raw) To: Pierre Neidhardt; +Cc: 31487-done Hello, Pierre Neidhardt <ambrevar@gmail.com> skribis: > * gnu/packages/patches/upx-protect-against-bad-crafted-input.patch: New file. > * gnu/packages/compression.scm (upx)[source]: Use it. I renamed the patch so that it includes the CVE id, added it to gnu/local.mk, and committed. Thanks! Ludo’. ^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2018-06-16 21:58 UTC | newest] Thread overview: 12+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2018-05-17 22:51 [bug#31487] [PATCH] gnu: Add upx Pierre Neidhardt 2018-05-18 6:46 ` Pierre Neidhardt 2018-05-26 20:14 ` Ludovic Courtès 2018-05-27 13:46 ` Pierre Neidhardt 2018-05-28 7:55 ` Ludovic Courtès 2018-05-29 6:42 ` Pierre Neidhardt 2018-05-29 13:27 ` Ludovic Courtès 2018-06-15 7:12 ` Ludovic Courtès 2018-06-16 14:58 ` Pierre Neidhardt 2018-06-16 19:15 ` Pierre Neidhardt 2018-06-16 14:54 ` [bug#31487] [PATCH] gnu: upx: Fix CVE-2017-15056 Pierre Neidhardt 2018-06-16 21:57 ` bug#31487: " Ludovic Courtès
Code repositories for project(s) associated with this external index https://git.savannah.gnu.org/cgit/guix.git This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.