72 lines
2.6 KiB
Perl
72 lines
2.6 KiB
Perl
#!/usr/bin/perl
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
use Test::More tests => 10;
|
|
use Test::Dpkg qw(:paths);
|
|
|
|
use File::Path qw(make_path);
|
|
|
|
BEGIN {
|
|
use_ok('Dpkg::Source::Patch');
|
|
}
|
|
|
|
my $datadir = test_get_data_path();
|
|
my $tmpdir = test_get_temp_path();
|
|
|
|
sub test_patch_escape {
|
|
my ($name, $symlink, $patchname, $desc) = @_;
|
|
|
|
make_path("$tmpdir/$name-tree");
|
|
make_path("$tmpdir/$name-out");
|
|
symlink "../$name-out", "$tmpdir/$name-tree/$symlink";
|
|
|
|
my $patch = Dpkg::Source::Patch->new(filename => "$datadir/$patchname");
|
|
eval {
|
|
$patch->apply("$tmpdir/$name-tree", verbose => 0);
|
|
};
|
|
ok(rmdir "$tmpdir/$name-out", $desc);
|
|
}
|
|
|
|
# This is CVE-2014-0471 with GNU patch >= 2.7
|
|
test_patch_escape('c-style-parsed', "\tmp", 'c-style.patch',
|
|
'patch(1) prevents escape using known c-style encoded filename');
|
|
|
|
# This is CVE-2014-0471 with GNU patch < 2.7
|
|
test_patch_escape('c-style-unknown', '\\tmp', 'c-style.patch',
|
|
'patch(1) prevents escape using unknown c-style encoded filename');
|
|
|
|
# This is CVE-2014-3865
|
|
test_patch_escape('index-alone', 'symlink', 'index-alone.patch',
|
|
'patch(1) prevents escape using Index: w/o ---/+++ header');
|
|
test_patch_escape('index-+++', 'symlink', 'index-+++.patch',
|
|
'patch(1) prevents escape using Index: w/ only +++ header');
|
|
test_patch_escape('index-inert', 'symlink', 'index-inert.patch',
|
|
'patch(1) should not fail to apply using an inert Index:');
|
|
ok(-e "$tmpdir/index-inert-tree/inert-file",
|
|
'patch(1) applies correctly with inert Index:');
|
|
|
|
# This is CVE-2014-3864
|
|
test_patch_escape('partial', 'symlink', 'partial.patch',
|
|
'patch(1) prevents escape using partial +++ header');
|
|
|
|
test_patch_escape('ghost-hunk', 'symlink', 'ghost-hunk.patch',
|
|
'patch(1) prevents escape using a disabling hunk');
|
|
|
|
# This is CVE-2017-8283
|
|
test_patch_escape('indent-header', 'symlink', 'indent-header.patch',
|
|
'patch(1) prevents escape using indented hunks');
|