diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-06 00:45:20 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-06 00:45:20 +0000 |
commit | 9a08cbfcc1ef900a04580f35afe2a4592d7d6030 (patch) | |
tree | 004cc7027bca2f2c0bcb5806527c8e0c48df2d6e /scripts/t/Dpkg_Source_Patch.t | |
parent | Initial commit. (diff) | |
download | dpkg-56b3e277e23b0b6313500e1e330e80b5ab6e6522.tar.xz dpkg-56b3e277e23b0b6313500e1e330e80b5ab6e6522.zip |
Adding upstream version 1.19.8.upstream/1.19.8upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'scripts/t/Dpkg_Source_Patch.t')
-rw-r--r-- | scripts/t/Dpkg_Source_Patch.t | 74 |
1 files changed, 74 insertions, 0 deletions
diff --git a/scripts/t/Dpkg_Source_Patch.t b/scripts/t/Dpkg_Source_Patch.t new file mode 100644 index 0000000..f50f15b --- /dev/null +++ b/scripts/t/Dpkg_Source_Patch.t @@ -0,0 +1,74 @@ +#!/usr/bin/perl +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <https://www.gnu.org/licenses/>. + +use strict; +use warnings; + +use Test::More tests => 10; +use Test::Dpkg qw(:paths); + +use File::Path qw(make_path); + +BEGIN { + use_ok('Dpkg::Source::Patch'); +} + +my $datadir = test_get_data_path(); +my $tmpdir = test_get_temp_path(); + +sub test_patch_escape { + my ($name, $symlink, $patchname, $desc) = @_; + + make_path("$tmpdir/$name-tree"); + make_path("$tmpdir/$name-out"); + symlink "../$name-out", "$tmpdir/$name-tree/$symlink"; + + my $patch = Dpkg::Source::Patch->new(filename => "$datadir/$patchname"); + eval { + $patch->apply("$tmpdir/$name-tree", verbose => 0); + }; + ok(rmdir "$tmpdir/$name-out", $desc); +} + +# This is CVE-2014-0471 with GNU patch >= 2.7 +test_patch_escape('c-style-parsed', "\tmp", 'c-style.patch', + 'Patch cannot escape using known c-style encoded filename'); + +# This is CVE-2014-0471 with GNU patch < 2.7 +test_patch_escape('c-style-unknown', '\\tmp', 'c-style.patch', + 'Patch cannot escape using unknown c-style encoded filename'); + +# This is CVE-2014-3865 +test_patch_escape('index-alone', 'symlink', 'index-alone.patch', + 'Patch cannot escape using Index: w/o ---/+++ header'); +test_patch_escape('index-+++', 'symlink', 'index-+++.patch', + 'Patch cannot escape using Index: w/ only +++ header'); +test_patch_escape('index-inert', 'symlink', 'index-inert.patch', + 'Patch should not fail to apply using an inert Index:'); +ok(-e "$tmpdir/index-inert-tree/inert-file", + 'Patch with inert Index: applies correctly'); + +# This is CVE-2014-3864 +test_patch_escape('partial', 'symlink', 'partial.patch', + 'Patch cannot escape using partial +++ header'); + +test_patch_escape('ghost-hunk', 'symlink', 'ghost-hunk.patch', + 'Patch cannot escape using a disabling hunk'); + +# This is CVE-2017-8283 +test_patch_escape('indent-header', 'symlink', 'indent-header.patch', + 'Patch cannot escape indented hunks'); + +1; |