This does not affect the current git head code, but it affects the release 
4.13.0.1. It's been reported before to the red hat security team and publicly 
here:
https://blog.fuzzing-project.org/52-Multiple-vulnerabilities-in-RPM-and-a-rant.html

[rpm-stackoverflow-glob.zip](https://github.com/rpm-software-management/rpm/files/782965/rpm-stackoverflow-glob.zip)

ASAN stack trace:
```
==16566==ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address 
0x7ffe01660342 at pc 0x7fe28839a527 bp 0x7ffe01660310 sp 0x7ffe01660308
WRITE of size 1 at 0x7ffe01660342 thread T0
    #0 0x7fe28839a526 in glob 
/mnt/ram/rpm-rpm-4.13.0.1-release/rpmio/rpmglob.c:342:7
    #1 0x7fe288393eec in rpmGlob 
/mnt/ram/rpm-rpm-4.13.0.1-release/rpmio/rpmglob.c:875:7
    #2 0x7fe2886bfe4a in rpmReadPackageManifest 
/mnt/ram/rpm-rpm-4.13.0.1-release/lib/manifest.c:117:14
    #3 0x7fe2887275e8 in tryReadManifest 
/mnt/ram/rpm-rpm-4.13.0.1-release/lib/rpminstall.c:319:10
    #4 0x7fe2887275e8 in rpmInstall 
/mnt/ram/rpm-rpm-4.13.0.1-release/lib/rpminstall.c:537
    #5 0x50b446 in main /mnt/ram/rpm-rpm-4.13.0.1-release/rpmqv.c:294:12
    #6 0x7fe2860db1e0 in __libc_start_main 
/var/tmp/portage/sys-libs/glibc-2.24-r1/work/glibc-2.24/csu/../csu/libc-start.c:289
    #7 0x41a429 in _start (/mnt/ram/rpm-rpm-4.13.0.1-release/.libs/rpm+0x41a429)


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/rpm-software-management/rpm/issues/156
_______________________________________________
Rpm-maint mailing list
Rpm-maint@lists.rpm.org
http://lists.rpm.org/mailman/listinfo/rpm-maint

Reply via email to