[arch-commits] Commit in bsdiff/trunk (PKGBUILD e48209b03f.patch)

Kyle Keen kkeen at archlinux.org
Sat Dec 19 23:10:16 UTC 2020


    Date: Saturday, December 19, 2020 @ 23:10:16
  Author: kkeen
Revision: 780052

fix source url, groundwork for FS#65971

Added:
  bsdiff/trunk/e48209b03f.patch
Modified:
  bsdiff/trunk/PKGBUILD

------------------+
 PKGBUILD         |   26 +++++++++--
 e48209b03f.patch |  119 +++++++++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 140 insertions(+), 5 deletions(-)

Modified: PKGBUILD
===================================================================
--- PKGBUILD	2020-12-19 23:08:41 UTC (rev 780051)
+++ PKGBUILD	2020-12-19 23:10:16 UTC (rev 780052)
@@ -8,18 +8,34 @@
 license=('BSD')
 arch=('x86_64')
 depends=('bzip2')
-source=("https://www.daemonology.net/${pkgname}/${pkgname}-${pkgver}.tar.gz"
+#source=("https://www.daemonology.net/bsdiff/bsdiff-$pkgver.tar.gz"
+source=("https://sources.voidlinux.org/bsdiff-$pkgver/bsdiff-$pkgver.tar.gz"
 	Makefile.patch
-        "https://security.freebsd.org/patches/SA-16:25/bspatch.patch")
+        "https://security.freebsd.org/patches/SA-16:25/bspatch.patch"
+        "https://github.com/freebsd/freebsd/commit/d0260bc283.patch"
+        "https://github.com/freebsd/freebsd/commit/59381119a4.patch"
+        "e48209b03f.patch"
+        "6e40d93.patch.b64::https://android-review.googlesource.com/changes/platform%2Fexternal%2Fbsdiff~961238/revisions/6/patch?download")
 md5sums=('e6d812394f0e0ecc8d5df255aa1db22a'
          'f176d14d39c5784a2c824f6797544f4b'
-         '30e8ec771baea61bd9c25adb385b06fc')
+         '30e8ec771baea61bd9c25adb385b06fc'
+         'f0a01c90ef3a9680017eacb81fbfdf02'
+         'eb9cddcc3fce507256990b82cc0917ee'
+         'bc8ecaecd841d9022a88a7c35151d598'
+         '56b07d7499454403903140ef44cd1b38')
 
+# todo: get patches to apply cleanly
+
 prepare() {
   cd "$srcdir/${pkgname}-${pkgver}"
   patch -p0 < ../Makefile.patch
-  sed -i 's|usr.bin/bsdiff/bspatch/||' ../bspatch.patch
-  patch -p0 < ../bspatch.patch
+  patch -p3 < ../bspatch.patch
+  #patch -p4 < ../d0260bc283.patch
+  #patch -p4 < ../59381119a4.patch
+  base64 -d ../6e40d93.patch.b64 > ../6e40d93.patch
+  sed -i 's|bspatch.cc|bspatch.c|g' ../6e40d93.patch
+  #patch -p1 < ../6e40d93.patch
+  #patch bspatch.c ../e48209b03f.patch
 }
 
 build() {

Added: e48209b03f.patch
===================================================================
--- e48209b03f.patch	                        (rev 0)
+++ e48209b03f.patch	2020-12-19 23:10:16 UTC (rev 780052)
@@ -0,0 +1,119 @@
+@@ -27,7 +27,10 @@
+ #include <sys/cdefs.h>
+ __FBSDID("$FreeBSD$");
+ 
++#include <assert.h>
+ #include <bzlib.h>
++#include <limits.h>
++#include <stdint.h>
+ #include <stdlib.h>
+ #include <stdio.h>
+ #include <string.h>
+@@ -63,8 +66,8 @@
+ 	BZFILE * cpfbz2, * dpfbz2, * epfbz2;
+ 	int cbz2err, dbz2err, ebz2err;
+ 	int fd;
+-	ssize_t oldsize,newsize;
+-	ssize_t bzctrllen,bzdatalen;
++	off_t oldsize,newsize;
++	off_t bzctrllen,bzdatalen;
+ 	u_char header[32],buf[8];
+ 	u_char *old, *new;
+ 	off_t oldpos,newpos;
+@@ -72,6 +75,8 @@
+ 	off_t lenread;
+ 	off_t i;
+ 
++	assert(OFF_MAX >= INT64_MAX);
++
+ 	if(argc!=4) errx(1,"usage: %s oldfile newfile patchfile\n",argv[0]);
+ 
+ 	/* Open patch file */
+@@ -107,8 +112,10 @@
+ 	bzctrllen=offtin(header+8);
+ 	bzdatalen=offtin(header+16);
+ 	newsize=offtin(header+24);
+-	if((bzctrllen<0) || (bzdatalen<0) || (newsize<0))
+-		errx(1,"Corrupt patch\n");
++	if((bzctrllen<0) || (bzctrllen>OFF_MAX-32) ||
++		(bzdatalen<0) || (bzctrllen+32>OFF_MAX-bzdatalen) ||
++		(newsize<=0) || (newsize>SSIZE_MAX))
++			errx(1,"Corrupt patch\n");
+ 
+ 	/* Close patch file and re-open it via libbzip2 at the right places */
+ 	if (fclose(f))
+@@ -136,12 +143,13 @@
+ 		errx(1, "BZ2_bzReadOpen, bz2err = %d", ebz2err);
+ 
+ 	if(((fd=open(argv[1],O_RDONLY|O_BINARY,0))<0) ||
+-		((oldsize=lseek(fd,0,SEEK_END))==-1) ||
+-		((old=malloc(oldsize+1))==NULL) ||
++		((oldsize=lseek(fd,0,SEEK_END))<=0) ||
++		(oldsize>SSIZE_MAX) ||
++		((old=malloc(oldsize))==NULL) ||
+ 		(lseek(fd,0,SEEK_SET)!=0) ||
+ 		(read(fd,old,oldsize)!=oldsize) ||
+ 		(close(fd)==-1)) err(1,"%s",argv[1]);
+-	if((new=malloc(newsize+1))==NULL) err(1,NULL);
++	if((new=malloc(newsize))==NULL) err(1,NULL);
+ 
+ 	oldpos=0;newpos=0;
+ 	while(newpos<newsize) {
+@@ -152,18 +160,23 @@
+ 			    (cbz2err != BZ_STREAM_END)))
+ 				errx(1, "Corrupt patch\n");
+ 			ctrl[i]=offtin(buf);
+-		};
++		}
+ 
+ 		/* Sanity-check */
+-		if(newpos+ctrl[0]>newsize)
+-			errx(1,"Corrupt patch\n");
++		if((ctrl[0]<0) || (ctrl[0]>INT_MAX) ||
++			(newpos>OFF_MAX-ctrl[0]) || (newpos+ctrl[0]>newsize))
++				errx(1,"Corrupt patch\n");
+ 
+-		/* Read diff string */
++		/* Read diff string - 4th arg converted to int */
+ 		lenread = BZ2_bzRead(&dbz2err, dpfbz2, new + newpos, ctrl[0]);
+ 		if ((lenread < ctrl[0]) ||
+ 		    ((dbz2err != BZ_OK) && (dbz2err != BZ_STREAM_END)))
+ 			errx(1, "Corrupt patch\n");
+ 
++		/* Sanity-check */
++		if(oldpos>OFF_MAX-ctrl[0])
++			errx(1,"Corrupt patch\n");
++
+ 		/* Add old data to diff string */
+ 		for(i=0;i<ctrl[0];i++)
+ 			if((oldpos+i>=0) && (oldpos+i<oldsize))
+@@ -174,19 +187,25 @@
+ 		oldpos+=ctrl[0];
+ 
+ 		/* Sanity-check */
+-		if(newpos+ctrl[1]>newsize)
+-			errx(1,"Corrupt patch\n");
++		if((ctrl[1]<0) || (ctrl[1]>INT_MAX) ||
++			(newpos>OFF_MAX-ctrl[1]) || (newpos+ctrl[1]>newsize))
++				errx(1,"Corrupt patch\n");
+ 
+-		/* Read extra string */
++		/* Read extra string - 4th arg converted to int */
+ 		lenread = BZ2_bzRead(&ebz2err, epfbz2, new + newpos, ctrl[1]);
+ 		if ((lenread < ctrl[1]) ||
+ 		    ((ebz2err != BZ_OK) && (ebz2err != BZ_STREAM_END)))
+ 			errx(1, "Corrupt patch\n");
+ 
++		/* Sanity-check */
++		if((ctrl[2]<0) ?
++			(oldpos<OFF_MIN-ctrl[2]) : (oldpos>OFF_MAX-ctrl[2]))
++				errx(1,"Corrupt patch\n");
++
+ 		/* Adjust pointers */
+ 		newpos+=ctrl[1];
+ 		oldpos+=ctrl[2];
+-	};
++	}
+ 
+ 	/* Clean up the bzip2 reads */
+ 	BZ2_bzReadClose(&cbz2err, cpfbz2);



More information about the arch-commits mailing list