From 6c4fe493d4cd2d71bd8ff42071218c0ed552a2e3 Mon Sep 17 00:00:00 2001 From: Martin Cermak Date: Tue, 16 Nov 2021 12:00:15 +0100 Subject: [PATCH] CI Gating: Use Regression and Sanity tests in automated runs --- .../Makefile | 64 ----------------- .../PURPOSE | 5 -- .../addr2line-buffer-over-flow1 | Bin 1860 -> 0 bytes .../main.fmf | 16 ----- .../runtest.sh | 39 ----------- .../Double-free-libelf | Bin 1896 -> 0 bytes .../Makefile | 65 ------------------ .../PURPOSE | 5 -- .../main.fmf | 16 ----- .../runtest.sh | 42 ----------- .../Buffer-over-readelf | Bin 2488 -> 0 bytes .../Makefile | 65 ------------------ .../PURPOSE | 5 -- .../bz1532205.supp | 25 ------- .../main.fmf | 16 ----- .../runtest.sh | 43 ------------ .../Makefile | 64 ----------------- .../POC-stack | Bin 4542 -> 0 bytes .../PURPOSE | 5 -- .../main.fmf | 15 ---- .../runtest.sh | 39 ----------- .../Makefile | 64 ----------------- .../POC-stack | Bin 4542 -> 0 bytes .../PURPOSE | 5 -- .../bz1532205.supp | 25 ------- .../main.fmf | 16 ----- .../runtest.sh | 42 ----------- .../Makefile | 64 ----------------- .../POC1 | Bin 4000 -> 0 bytes .../PURPOSE | 3 - .../main.fmf | 13 ---- .../runtest.sh | 38 ---------- .../Makefile | 64 ----------------- .../POC2 | Bin 4000 -> 0 bytes .../PURPOSE | 5 -- .../main.fmf | 16 ----- .../runtest.sh | 42 ----------- .../CVE-2018-18521-divide-by-zero/Makefile | 64 ----------------- .../CVE-2018-18521-divide-by-zero/POC2 | Bin 4000 -> 0 bytes .../CVE-2018-18521-divide-by-zero/PURPOSE | 5 -- .../CVE-2018-18521-divide-by-zero/main.fmf | 16 ----- .../CVE-2018-18521-divide-by-zero/runtest.sh | 43 ------------ .../Makefile | 64 ----------------- .../POC2 | Bin 4000 -> 0 bytes .../PURPOSE | 5 -- .../main.fmf | 15 ---- .../runtest.sh | 38 ---------- tests/Security/CVE-2019-7146/Makefile | 64 ----------------- tests/Security/CVE-2019-7146/PURPOSE | 3 - tests/Security/CVE-2019-7146/main.fmf | 14 ---- tests/Security/CVE-2019-7146/poc | Bin 428 -> 0 bytes tests/Security/CVE-2019-7146/runtest.sh | 41 ----------- .../Makefile | 64 ----------------- .../POC1 | Bin 3208 -> 0 bytes .../PURPOSE | 5 -- .../main.fmf | 16 ----- .../runtest.sh | 43 ------------ .../Makefile | 64 ----------------- .../POC1 | Bin 10442 -> 0 bytes .../POC2 | Bin 10467 -> 0 bytes .../PURPOSE | 5 -- .../main.fmf | 16 ----- .../runtest.sh | 40 ----------- .../Makefile | 64 ----------------- .../POC | Bin 10393 -> 0 bytes .../PURPOSE | 5 -- .../main.fmf | 16 ----- .../runtest.sh | 40 ----------- .../Makefile | 64 ----------------- .../POC2 | Bin 2659 -> 0 bytes .../PURPOSE | 5 -- .../main.fmf | 16 ----- .../runtest.sh | 41 ----------- .../Makefile | 63 ----------------- .../PURPOSE | 5 -- .../dwz-overflow.elf | Bin 24928 -> 0 bytes .../main.fmf | 16 ----- .../runtest.sh | 56 --------------- 78 files changed, 1942 deletions(-) delete mode 100644 tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/Makefile delete mode 100644 tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/PURPOSE delete mode 100644 tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/addr2line-buffer-over-flow1 delete mode 100644 tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/main.fmf delete mode 100755 tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/runtest.sh delete mode 100644 tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/Double-free-libelf delete mode 100644 tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/Makefile delete mode 100644 tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/PURPOSE delete mode 100644 tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/main.fmf delete mode 100755 tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/runtest.sh delete mode 100644 tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/Buffer-over-readelf delete mode 100644 tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/Makefile delete mode 100644 tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/PURPOSE delete mode 100644 tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/bz1532205.supp delete mode 100644 tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/main.fmf delete mode 100755 tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/runtest.sh delete mode 100644 tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/Makefile delete mode 100644 tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/POC-stack delete mode 100644 tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/PURPOSE delete mode 100644 tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/main.fmf delete mode 100755 tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/runtest.sh delete mode 100644 tests/Security/CVE-2018-18310-invalid-memory-address-dereference/Makefile delete mode 100644 tests/Security/CVE-2018-18310-invalid-memory-address-dereference/POC-stack delete mode 100644 tests/Security/CVE-2018-18310-invalid-memory-address-dereference/PURPOSE delete mode 100644 tests/Security/CVE-2018-18310-invalid-memory-address-dereference/bz1532205.supp delete mode 100644 tests/Security/CVE-2018-18310-invalid-memory-address-dereference/main.fmf delete mode 100755 tests/Security/CVE-2018-18310-invalid-memory-address-dereference/runtest.sh delete mode 100644 tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/Makefile delete mode 100644 tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/POC1 delete mode 100644 tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/PURPOSE delete mode 100644 tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/main.fmf delete mode 100755 tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/runtest.sh delete mode 100644 tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/Makefile delete mode 100644 tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/POC2 delete mode 100644 tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/PURPOSE delete mode 100644 tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/main.fmf delete mode 100755 tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/runtest.sh delete mode 100644 tests/Security/CVE-2018-18521-divide-by-zero/Makefile delete mode 100644 tests/Security/CVE-2018-18521-divide-by-zero/POC2 delete mode 100644 tests/Security/CVE-2018-18521-divide-by-zero/PURPOSE delete mode 100644 tests/Security/CVE-2018-18521-divide-by-zero/main.fmf delete mode 100755 tests/Security/CVE-2018-18521-divide-by-zero/runtest.sh delete mode 100644 tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/Makefile delete mode 100644 tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/POC2 delete mode 100644 tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/PURPOSE delete mode 100644 tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/main.fmf delete mode 100755 tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/runtest.sh delete mode 100644 tests/Security/CVE-2019-7146/Makefile delete mode 100644 tests/Security/CVE-2019-7146/PURPOSE delete mode 100644 tests/Security/CVE-2019-7146/main.fmf delete mode 100644 tests/Security/CVE-2019-7146/poc delete mode 100755 tests/Security/CVE-2019-7146/runtest.sh delete mode 100644 tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/Makefile delete mode 100644 tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/POC1 delete mode 100644 tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/PURPOSE delete mode 100644 tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/main.fmf delete mode 100755 tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/runtest.sh delete mode 100644 tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/Makefile delete mode 100644 tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/POC1 delete mode 100644 tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/POC2 delete mode 100644 tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/PURPOSE delete mode 100644 tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/main.fmf delete mode 100755 tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/runtest.sh delete mode 100644 tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/Makefile delete mode 100644 tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/POC delete mode 100644 tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/PURPOSE delete mode 100644 tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/main.fmf delete mode 100755 tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/runtest.sh delete mode 100644 tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/Makefile delete mode 100644 tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/POC2 delete mode 100644 tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/PURPOSE delete mode 100644 tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/main.fmf delete mode 100755 tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/runtest.sh delete mode 100644 tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/Makefile delete mode 100644 tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/PURPOSE delete mode 100644 tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/dwz-overflow.elf delete mode 100644 tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/main.fmf delete mode 100755 tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/runtest.sh diff --git a/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/Makefile b/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/Makefile deleted file mode 100644 index 09a9e16..0000000 --- a/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read -# Description: CVE-2018-16062-elfutils-Heap-based-buffer-over-read -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE addr2line-buffer-over-flow1 - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-16062-elfutils-Heap-based-buffer-over-read" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1625260" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/PURPOSE b/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/PURPOSE deleted file mode 100644 index 3281134..0000000 --- a/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read -Description: CVE-2018-16062-elfutils-Heap-based-buffer-over-read -Author: Martin Cermak -Bug summary: 2 elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file [rhel-7] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1625260 diff --git a/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/addr2line-buffer-over-flow1 b/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/addr2line-buffer-over-flow1 deleted file mode 100644 index 8db05cc5e161d3235c6e1a95595c23404b9de5dd..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1860 zcmdT_O-vI}5T4h6pb)@_L_rosCB{?=ghVbjDta+q)Qd4$x81ef*lwHc)@U?Ry%;$t zh+yK0aQ2|yyy)V=crixrno0sDo-~@Er~19OyiyZ1!JCuLoB8IOc{AC4`#L^${3v6L zr1Y09wfQ}8z%+veu`3q#|LBukAZ zGALHAOji0o$CnrPf7>6w|8<4UP7F*17gi!OKkilEbfL44PeE&AZ57yCw!nD&X3Y5% zD5sg0;Mx#aEoHkAVMnmcLr+1y6eO^aF9GvCf*|>QLDO<5FaAIn-PF_vrbA^3|W2gnq$s9^iHg6dUmbBt^GjxT2S0W-7j#QMDU`qh;5tRoVGj*Xz zsnN5Jkt>}2t;?*}B`doiyILfQ6))!;EeY$`p3O+lF)le2)5TSz*_xF$iV_w|NlVME zVbeOFmzxNN`NNi~4f!nj-35%@b)@ zUP2WCK32Kmdr+BL_e!5*$TF1okRtK`5>U3f1LyeP0lz2Zp@3WF^l^mRp;9_9&_fAe zc?p*@P*!&nzd+uIBt-^|bCZD9hky8qx2Z{B)x!%Ec>^9^=mhb)mgRALpEfAAsL2xY ruGP?5FP@8$gw*E;nvl -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read -extra-task: /tools/elfutils/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read diff --git a/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/runtest.sh b/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/runtest.sh deleted file mode 100755 index fa3fc0c..0000000 --- a/tests/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read/runtest.sh +++ /dev/null @@ -1,39 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-16062-elfutils-Heap-based-buffer-over-read -# Description: CVE-2018-16062-elfutils-Heap-based-buffer-over-read -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - # Reproduced with elfutils-0.172-2.el7.x86_64 valgrind-3.13.0-13.el7.x86_64 - rlRun "valgrind -q --error-exitcode=99 eu-addr2line -e addr2line-buffer-over-flow1 -- 500 50 10 -1000" - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/Double-free-libelf b/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/Double-free-libelf deleted file mode 100644 index da7ce216809f9ed95d5d2f5c662c3e02c7963d8e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1896 zcmeHITWAwe5S`5?v9YU0Q=~qsOH*yd8e8gvLeWK3YUxM82Ux{!(j>m>gCz^1!#gAeuTJcBy@<*i56rrG~ph96ivp2U1q6qrygt>F(ap%t5J4ueL zXA-Y^`<#(Nui7&svFx3pds(lqet&IE4bh?smszl}DP<)P zXvRsIzScijrBn=*>c-5by4p|a8~6J<{JSRyuIt_L+Vri6)t{#NZs)MX*W!))Tbq6I zd_85I4M$BgLKVSax4LTZ`vZ^B`{YUQf`=!&1~s$qxx4(*gVGb17Os4=x$ds(0MU%k zMUM*#sYqGtQ3o<8i}g*Oq0HFfpf^#}@2^&A*#tH7^I;-%y0`Sqe1pi7q!k6pD!*C3 zuTc5jrj(WDwl>wgR4JVq+ZyzTpIv==#=5el+-eTH!r*(dNwfgI<9=1xcwr) zhLjaRJ>RCdd$gXVvm2_b%X&1eK`ZKW50tmuBY#4@U3Vp2H@8?-Y1W80NTI}`J;`tc zGTG_Kv@KC*tRs|+rIHkihLd3mJxU}f)D?|I4s34=MulRY6mViK5R%{^KZq5QYCAMKM48? -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-16402-double-free-due-to-double-decompression -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE Double-free-libelf - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-16402-double-free-due-to-double-decompression" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: nothing" >> $(METADATA) - @echo "Requires: elfutils" >> $(METADATA) - @echo "Requires: valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1625052" >> $(METADATA) - @echo "Releases: -RHEL4 -RHEL6 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/PURPOSE b/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/PURPOSE deleted file mode 100644 index 2b1d552..0000000 --- a/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2018-16402-double-free-due-to-double-decompression -Description: CVE-2018-16402-double-free-due-to-double-decompression -Author: Martin Cermak -Bug summary: 2 elfutils: Double-free due to double decompression of sections in crafted ELF causes crash [rhel-8] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1625052 diff --git a/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/main.fmf b/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/main.fmf deleted file mode 100644 index f7be31f..0000000 --- a/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2018-16402-double-free-due-to-double-decompression -description: | - Bug summary: 2 elfutils: Double-free due to double decompression of sections in crafted ELF causes crash [rhel-8] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1625052 -contact: -- Martin Cermak -component: -- nothing -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-16402-double-free-due-to-double-decompression -extra-task: /tools/elfutils/Security/CVE-2018-16402-double-free-due-to-double-decompression diff --git a/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/runtest.sh b/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/runtest.sh deleted file mode 100755 index 96e322b..0000000 --- a/tests/Security/CVE-2018-16402-double-free-due-to-double-decompression/runtest.sh +++ /dev/null @@ -1,42 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-16402-double-free-due-to-double-decompression -# Description: CVE-2018-16402-double-free-due-to-double-decompression -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - TMP=$(mktemp) - rlRun "valgrind -q eu-readelf -S ./Double-free-libelf |& tee $TMP" - rlRun "fgrep 'Invalid free()' $TMP" 1 - rlRun "fgrep 'Section Headers:' $TMP" - rm -f $TMP - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/Buffer-over-readelf b/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/Buffer-over-readelf deleted file mode 100644 index 4b214cd6a4ccea57a812360be992777dc12ccff2..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2488 zcma)8&1(}u6n~Snc4MkZYOrEOSMZ~Lbo*hc(t?c?wO}ct_M})g?IsqRjU=nogLJD1 z;>nvJ3f{c-=*^?x#eYHQ#s8rP{k_?l&1BPvkIu}S-+RCJX5P$fx_N!!Mk*yJ7C{%F z8$fJFiAQY|phr1u-B>`-#%0C~al4SF;EU*+OiH)s|gCKyNNC*>mFyN1U3AM!etT!aP1o7Zz)3Z5V44#jRsb#89j9!8nYnN=Dyt2D#ai>u@`pVtDn zOiuGzBN`ty1J*1j@HPT+R^7lQr`&8p^~z7H%Wk>c@Sc&=@YY=gt@)L@3EW>_^F0$- zt~A_QJM!dd*>`JIgf#-W4cD)F!2EjPIo}tTMw)@U@|c{JdadT+cnrx$dfWC5^S{-h zuyw!pC0t8tUQFO-rjxMY*ll)6bEjkn$A3>x5~FcV=nQN)RT-S}@6?{x>i1x!OV>%kUvGc)R7?03Kh(BzB4sP}sW`fao>`GtNq6Yw!b z=nMdFp(XPx-^^#Fa30Rz$8#jdpA^PjqOe>3dF6M7^Jx+=L!}3px8;w6r7~X?e+(n% zZPbN(h;Op$h5_6&zgJE{>in*Khpw)`#M%x~61BE5h4VFlUD{|0O`UW-oRgPQRA zwUnTk{;x3KGk++*oRX&Ze?ZRK^S=is&jn-1cGgg&jLQBp`k$d^}+{ z{R^TVo20*&`n%8X vhlv{3oX1^oe$y!s;4e#Elv#;RMgEqJ(UfDD@DkhC6J5H!^76j8#r}T*GCG^A diff --git a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/Makefile b/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/Makefile deleted file mode 100644 index de1c93a..0000000 --- a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/Makefile +++ /dev/null @@ -1,65 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -# Description: CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE Buffer-over-readelf bz1532205.supp - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: nothing" >> $(METADATA) - @echo "Requires: elfutils" >> $(METADATA) - @echo "Requires: valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: yes" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1625057" >> $(METADATA) - @echo "Releases: -RHEL4 -RHEL6 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/PURPOSE b/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/PURPOSE deleted file mode 100644 index 10589cc..0000000 --- a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -Description: CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -Author: Martin Cermak -Bug summary: 3 elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash [rhel-8] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1625057 diff --git a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/bz1532205.supp b/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/bz1532205.supp deleted file mode 100644 index 70f0f80..0000000 --- a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/bz1532205.supp +++ /dev/null @@ -1,25 +0,0 @@ -{ - - Memcheck:Cond - fun:_nl_explode_name -} -{ - - Memcheck:Cond - fun:_nl_make_l10nflist -} -{ - - Memcheck:Addr4 - fun:_nl_make_l10nflist -} -{ - - Memcheck:Addr4 - fun:new_composite_name -} -{ - - Memcheck:Cond - fun:_nl_explode_name -} diff --git a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/main.fmf b/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/main.fmf deleted file mode 100644 index e934d57..0000000 --- a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -description: | - Bug summary: 3 elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash [rhel-8] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1625057 -contact: -- Martin Cermak -component: -- nothing -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -extra-task: /tools/elfutils/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c diff --git a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/runtest.sh b/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/runtest.sh deleted file mode 100755 index ffd6160..0000000 --- a/tests/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c/runtest.sh +++ /dev/null @@ -1,43 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -# Description: CVE-2018-16403-heap-based-buffer-over-read-in-libdw-dwarf_getabbrev-c -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - arch | grep -q ppc64le && VGSUPP='--suppressions=bz1532205.supp' || VGSUPP='' - TMP=$(mktemp) - rlRun "valgrind $VGSUPP -q eu-readelf --debug-dump=abbrev ./Buffer-over-readelf |& tee $TMP" - rlRun "fgrep 'Invalid read of size' $TMP" 1 - rlRun "fgrep 'Abbreviation section at offset' $TMP" - rm -f $TMP - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/Makefile b/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/Makefile deleted file mode 100644 index de96661..0000000 --- a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference -# Description: CVE-2018-18310-elfutils-invalid-memory-address-dereference -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC-stack - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-18310-elfutils-invalid-memory-address-dereference" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1651567" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/POC-stack b/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/POC-stack deleted file mode 100644 index 2b486e8d4c7d1fedc5fe06ed22de1f335c3d1180..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4542 zcmai1>u(%a6+g4HcDHfkXF{yHG~>i+Qz;&&jvE54%R06byLBE)HYf?9H?uqA-KFbY zcV{-(p(vX)wEd6|RVXPRB4i1PPZdI_{{SE%Ar+B+K}diAsh|L%&`>p01uehdy)$-R z5=XlCp2zQ=bMLv2xpQuMZl7gYB9cK7Nr^3#u3boH#?W4Rh+2^`ae&w^Loz7sT86F( z3<^5@t0mpi27MaErX5bk&clw<2bqO7`eq@`p~Kv_(;1cxQ1&N=ZuuwK856cWdrSoY^5Mv7R)QZtBxi8h+QNzChJ$>yzcnme?XMD8Krkf%g&~m)A=fCw) z^y{kw55i)7qt$AC487})gzixpIoBvxe7{^DDOSq)!tkj3bEq`SSx>b305KxQb@$6Q-I z*0#>R4!d)pvm0xY8j_BVX9w&~%t*5xcBU!mF|j+p(D8J~Y~L3jO05%VdrW4z8rtKr zcKX`}QB&d<;8?b$67Mqd48gDkss}QW5s0T^t!n zwV|uDrQ{XJKNc&MrreRrU4;CeScBuK4s58etOaW0c+TtbI7y&pJg=5uUI~D`(Ofb3fSQ6J?uEL-Ez+bKuqPnr13F=|FR*i+^oX^a} z=X|jeF;o+E6fB{h$CSmb*L*MX#0^SnzV0mqs^r68B8huqYdKP0SofAq59QT0|J4Fu z7>2h{E+AwL4pF&`vcq`X7lz^%Y6}Yi(u*z9lj@hPyh#k5!(Acc^EH@)e50tme7+u> zL1!&hJdyQc_%K3}3|sfA#URA0CtmJqtvf9P+_Hcms-^E$2t37_VjKCbC=Z|j_lY49 z2XaE`n0XR?VjS<#ObPN(0z#XX=6;G(C?B_4HO}@DaF>8{z<;Fo2yv$H=IcNq?rq@S z1}+O8_mYoBbRrWg`+9SWPojpf$Y!nqH#^_ zSrpveT73##PQi{{jZXJ`&7f+^7Suj){_pN3o`y>(?2IXV%0m;uAJdyfA#v)0&*N)o zVw|k}B%N6SZYOOqaoWUQMoDn|yj}zD0u{y+KA<41$#>8sI3CU%q$X_%4S)gQyQb0e z#Q}Y+l$P$*Qw*CPA6Di2;OYBjtJSp#e~U2efSgc_lXswCTntOD0(TXLA0{BQ#Bu5L zCmZVknX33Jym~sPR*e2G+t3uSv}yVkYQ(xpf5w&38&UJWL5-1S&TK;r*> z@Eo>%t0mbh=}Z=#XiJDZ3qwu8KGiNi%O%FxM*B^X^8G0CaLs!4$P5Gyjw1l_oYGOz z@hwA1%zs10WnjG1fS)$wNz5YufC2PhlnKnf)iQgUxGmaZmVk3&X-CCYJ4N$4aBoo7 zlugvKF~LcXw)A5wUDO?8s0>1ikF8c+YrZ=onrZZ^k^E1ecZ%TfcyOn2LR|7Gu~z5C_ea#gyHH+a#CtG<#B{X`FF~CbXkh zWCh9H3dK_>%yW0s+yuygWKl@(eg=a_M@LI*gNjAn{F!y@kMayICbD=6cd-LMJVs_@ zOJA5qHY4W6_%H(7jLrchXM!Mo9kK-$O9$e8#@40^^bF)bk>PZCbCI|8UB+wKzwmCX zL0+X~?3S@(?iVh`R$N7(YZo@e@_LF{-XLhxw%}a|NiNVj~Is81ljUg!^HI@25pFo znTCCHESshSgO9sv1$V8;X6*RutFjrT!PDL+k9?3M!a^b(n7Z+{A|i#aKR0If748fp z&!BDIX6M(AcLm~}BPJn!>G_?16J1x>pUzgjt^hWN8GP8%s<;#7pMszHripLiXuSvd z_VL9~-N0*;r#W6&=z8S?$NYIgz^i(r+ycXE9}VEWvJL~Cy0Te^wPcfg5AtDbBxbbt z(FbKGOUm> zh=fsNe%?KaZU5Zl5jFSx(VS9vL)L?0IgEn3iWXD>KMr_6uBj@Cs-XOuDpqQFucG{@ zRu7feSQ5Nn7b`&&yz1^A-Srea-vP=4lv@gv-&j~!hS9vBwWRn%p)A2;Sq0DE??5Va zn87%CIMpXFsPg72?< z?46sYJN{*>Law3o+g{D)4yd*1=MGGkF!`L9uLQs@?b+=XgGenFR8(qIUv%?J;ydu2 z5Lb+Z--GyDt^(g1^Cb4J_{>i%s<=?A8Uf=)n!=hYc~zgGX3Z~GXnwikQR>%$8urT7 zYrs?yg0$%kPab^+Z*J$FVO2?~0NCo5h( X#QG|Q*_zBEKGJ{%e}a1e>dOBBk<{Mn diff --git a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/PURPOSE b/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/PURPOSE deleted file mode 100644 index 6688efc..0000000 --- a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference -Description: CVE-2018-18310-elfutils-invalid-memory-address-dereference -Author: Martin Cermak -Bug summary: 0 elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl [rhdts-8] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1651567 diff --git a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/main.fmf b/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/main.fmf deleted file mode 100644 index 6ab4075..0000000 --- a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/main.fmf +++ /dev/null @@ -1,15 +0,0 @@ -summary: CVE-2018-18310-elfutils-invalid-memory-address-dereference -description: | - Bug summary: 0 elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl [rhdts-8] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1651567 -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference -extra-task: /tools/elfutils/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference diff --git a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/runtest.sh b/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/runtest.sh deleted file mode 100755 index 09c885c..0000000 --- a/tests/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference/runtest.sh +++ /dev/null @@ -1,39 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-18310-elfutils-invalid-memory-address-dereference -# Description: CVE-2018-18310-elfutils-invalid-memory-address-dereference -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - # Expect exitcode 2, unfixed package segfaults (139) - rlRun "eu-stack --core=POC-stack" 2 - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/Makefile b/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/Makefile deleted file mode 100644 index 6a50f8a..0000000 --- a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2018-18310-invalid-memory-address-dereference -# Description: CVE-2018-18310-invalid-memory-address-dereference -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-18310-invalid-memory-address-dereference -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC-stack bz1532205.supp - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-18310-invalid-memory-address-dereference" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: nothing" >> $(METADATA) - @echo "Requires: elfutils valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1642606" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5 -RHEL6" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/POC-stack b/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/POC-stack deleted file mode 100644 index 2b486e8d4c7d1fedc5fe06ed22de1f335c3d1180..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4542 zcmai1>u(%a6+g4HcDHfkXF{yHG~>i+Qz;&&jvE54%R06byLBE)HYf?9H?uqA-KFbY zcV{-(p(vX)wEd6|RVXPRB4i1PPZdI_{{SE%Ar+B+K}diAsh|L%&`>p01uehdy)$-R z5=XlCp2zQ=bMLv2xpQuMZl7gYB9cK7Nr^3#u3boH#?W4Rh+2^`ae&w^Loz7sT86F( z3<^5@t0mpi27MaErX5bk&clw<2bqO7`eq@`p~Kv_(;1cxQ1&N=ZuuwK856cWdrSoY^5Mv7R)QZtBxi8h+QNzChJ$>yzcnme?XMD8Krkf%g&~m)A=fCw) z^y{kw55i)7qt$AC487})gzixpIoBvxe7{^DDOSq)!tkj3bEq`SSx>b305KxQb@$6Q-I z*0#>R4!d)pvm0xY8j_BVX9w&~%t*5xcBU!mF|j+p(D8J~Y~L3jO05%VdrW4z8rtKr zcKX`}QB&d<;8?b$67Mqd48gDkss}QW5s0T^t!n zwV|uDrQ{XJKNc&MrreRrU4;CeScBuK4s58etOaW0c+TtbI7y&pJg=5uUI~D`(Ofb3fSQ6J?uEL-Ez+bKuqPnr13F=|FR*i+^oX^a} z=X|jeF;o+E6fB{h$CSmb*L*MX#0^SnzV0mqs^r68B8huqYdKP0SofAq59QT0|J4Fu z7>2h{E+AwL4pF&`vcq`X7lz^%Y6}Yi(u*z9lj@hPyh#k5!(Acc^EH@)e50tme7+u> zL1!&hJdyQc_%K3}3|sfA#URA0CtmJqtvf9P+_Hcms-^E$2t37_VjKCbC=Z|j_lY49 z2XaE`n0XR?VjS<#ObPN(0z#XX=6;G(C?B_4HO}@DaF>8{z<;Fo2yv$H=IcNq?rq@S z1}+O8_mYoBbRrWg`+9SWPojpf$Y!nqH#^_ zSrpveT73##PQi{{jZXJ`&7f+^7Suj){_pN3o`y>(?2IXV%0m;uAJdyfA#v)0&*N)o zVw|k}B%N6SZYOOqaoWUQMoDn|yj}zD0u{y+KA<41$#>8sI3CU%q$X_%4S)gQyQb0e z#Q}Y+l$P$*Qw*CPA6Di2;OYBjtJSp#e~U2efSgc_lXswCTntOD0(TXLA0{BQ#Bu5L zCmZVknX33Jym~sPR*e2G+t3uSv}yVkYQ(xpf5w&38&UJWL5-1S&TK;r*> z@Eo>%t0mbh=}Z=#XiJDZ3qwu8KGiNi%O%FxM*B^X^8G0CaLs!4$P5Gyjw1l_oYGOz z@hwA1%zs10WnjG1fS)$wNz5YufC2PhlnKnf)iQgUxGmaZmVk3&X-CCYJ4N$4aBoo7 zlugvKF~LcXw)A5wUDO?8s0>1ikF8c+YrZ=onrZZ^k^E1ecZ%TfcyOn2LR|7Gu~z5C_ea#gyHH+a#CtG<#B{X`FF~CbXkh zWCh9H3dK_>%yW0s+yuygWKl@(eg=a_M@LI*gNjAn{F!y@kMayICbD=6cd-LMJVs_@ zOJA5qHY4W6_%H(7jLrchXM!Mo9kK-$O9$e8#@40^^bF)bk>PZCbCI|8UB+wKzwmCX zL0+X~?3S@(?iVh`R$N7(YZo@e@_LF{-XLhxw%}a|NiNVj~Is81ljUg!^HI@25pFo znTCCHESshSgO9sv1$V8;X6*RutFjrT!PDL+k9?3M!a^b(n7Z+{A|i#aKR0If748fp z&!BDIX6M(AcLm~}BPJn!>G_?16J1x>pUzgjt^hWN8GP8%s<;#7pMszHripLiXuSvd z_VL9~-N0*;r#W6&=z8S?$NYIgz^i(r+ycXE9}VEWvJL~Cy0Te^wPcfg5AtDbBxbbt z(FbKGOUm> zh=fsNe%?KaZU5Zl5jFSx(VS9vL)L?0IgEn3iWXD>KMr_6uBj@Cs-XOuDpqQFucG{@ zRu7feSQ5Nn7b`&&yz1^A-Srea-vP=4lv@gv-&j~!hS9vBwWRn%p)A2;Sq0DE??5Va zn87%CIMpXFsPg72?< z?46sYJN{*>Law3o+g{D)4yd*1=MGGkF!`L9uLQs@?b+=XgGenFR8(qIUv%?J;ydu2 z5Lb+Z--GyDt^(g1^Cb4J_{>i%s<=?A8Uf=)n!=hYc~zgGX3Z~GXnwikQR>%$8urT7 zYrs?yg0$%kPab^+Z*J$FVO2?~0NCo5h( X#QG|Q*_zBEKGJ{%e}a1e>dOBBk<{Mn diff --git a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/PURPOSE b/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/PURPOSE deleted file mode 100644 index eb0721d..0000000 --- a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2018-18310-invalid-memory-address-dereference -Description: CVE-2018-18310-invalid-memory-address-dereference -Author: Martin Cermak -Bug summary: 0 elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl [rhel-8] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1642606 diff --git a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/bz1532205.supp b/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/bz1532205.supp deleted file mode 100644 index 70f0f80..0000000 --- a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/bz1532205.supp +++ /dev/null @@ -1,25 +0,0 @@ -{ - - Memcheck:Cond - fun:_nl_explode_name -} -{ - - Memcheck:Cond - fun:_nl_make_l10nflist -} -{ - - Memcheck:Addr4 - fun:_nl_make_l10nflist -} -{ - - Memcheck:Addr4 - fun:new_composite_name -} -{ - - Memcheck:Cond - fun:_nl_explode_name -} diff --git a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/main.fmf b/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/main.fmf deleted file mode 100644 index 86d6871..0000000 --- a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2018-18310-invalid-memory-address-dereference -description: | - Bug summary: 0 elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl [rhel-8] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1642606 -contact: -- Martin Cermak -component: -- nothing -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-18310-invalid-memory-address-dereference -extra-task: /tools/elfutils/Security/CVE-2018-18310-invalid-memory-address-dereference diff --git a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/runtest.sh b/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/runtest.sh deleted file mode 100755 index ba44f8d..0000000 --- a/tests/Security/CVE-2018-18310-invalid-memory-address-dereference/runtest.sh +++ /dev/null @@ -1,42 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-18310-invalid-memory-address-dereference -# Description: CVE-2018-18310-invalid-memory-address-dereference -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - arch | grep -q ppc64le && VGSUPP='--suppressions=bz1532205.supp' || VGSUPP='' - TMP=$(mktemp) - rlRun "valgrind $VGSUPP -q eu-stack --core=./POC-stack |& tee $TMP" - rlRun "fgrep 'Invalid read of size' $TMP" 1 - rm -f $TMP - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/Makefile b/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/Makefile deleted file mode 100644 index 1728cdc..0000000 --- a/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files -# Description: CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC1 - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1651200" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/POC1 b/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/POC1 deleted file mode 100644 index 1f6c719c0078b36858065d83b4ae69d7c5d91b7b..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4000 zcmbVOOK%)S5U$xBV`rBTgTS&Bka{IcaZo(om)8rj&_s?C%OVKnAsGn?&#pHz58KE) zD1i%eL5jp*04YCVIUvD_-1!6C{RhI06HwJvH9fPly9t!k_3Enb>c@Q3wXNu^fAn5u z{q9G%JMDF&)M&Na%}%Sk`HnGl>&$Xvx?PPtsMKT(VETc@+$b-rD{MO%MG^FRJ!(zp z_xseW(&9+$4^CZ4MrzvZU@42XDz2$fuXoyQV;apiJIq1l+nx7smP#HEMBIZV%bh2q zdCS%ag;!zWeDrJ|R(|#2H*B@@(P$t1`M>Aq;Z}M3U9)=YgZo!aJJ<{wrd4k=>zmEG zS-mqjG`msE{IS-_vjVx^2?W=NL6p5n;Ov)-2DE+jkl_MzhAsWb_l`n z>*F};p^VR19;p@&x-kSdqBw$}HylFHKRrJF>I8i!r|}@b+SZ0~)c+iUv%wcpFgW_; z!C7=Xpm7~7I5n%8tRecVsV^bzGB(}Vm&n1iNFrn%ct6F!seDmUm>M$8FFQYJW?yX$ z5ZmR4a0Pu@z2qBBlYAG>9VY9zhCUs>u8AT!KY=y%+f})E%G9w5wQocl+%e zRyJPu0!GFY1JE`HRmAeg8 zk4TfXr(mcJ2_;alDG@Vwmul$LnedwB=*yhtj1^T8cP3z{_QJG$y)_h=!O%sivyh)+ zDE83zuXR%0MGSRc;*aS_koyXCz0{pzDC#bg6Q8hv4_V@Bk+68hA~L68Xo8=b#?iV6 ztMuDeKi$Py82SwRiSDsTdA5Gi$Lp3rU+1B56hkSV{R`7DRMY&wWFTI+7$~yyJ8xcl z4u*y{S_ZNP9_rXS5*t(Y((|^qGK~LU7;1C?mPHIT_I+2yN1m>e&WVVy^#NjQulE^0 zHQ5aYCDo4gl9=Gp#p(nt z#R3k~lLFXPhe+QYIMmRm!z%`A_+wSZq||G@g4Ko$n{PF;04TqRrPRY;< diff --git a/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/main.fmf b/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/main.fmf deleted file mode 100644 index 417d678..0000000 --- a/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/main.fmf +++ /dev/null @@ -1,13 +0,0 @@ -summary: CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files -description: '' -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files -extra-task: /tools/elfutils/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files diff --git a/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/runtest.sh b/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/runtest.sh deleted file mode 100755 index b29cf5b..0000000 --- a/tests/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files/runtest.sh +++ /dev/null @@ -1,38 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files -# Description: CVE-2018-18520-elfutils-eu-size-cannot-handle-recursive-ar-files -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - rlRun "eu-size POC1" - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/Makefile b/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/Makefile deleted file mode 100644 index 8375a2c..0000000 --- a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -# Description: CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC2 - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1646479" >> $(METADATA) - @echo "Releases: -RHEL4 -RHEL6 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/POC2 b/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/POC2 deleted file mode 100644 index 2221cf4e3e0af720db0da033c2a2e49e1b358477..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4000 zcmbVOOK%)S5bp7gv9n8vL10-5NWGG!I4B;^KD=I#g(h;GSQbGj56MVK?Cg3Y^RSJ) zgA%wf7o0$)P*tDzA%10v@Pk!>z+tf)!&W z%qwc~eE94@t^OLS-=I~`hr0hnrW_R6 zsQ1#0{Og-nd4|_f2H)IK!J}7#%P(Jg5>UsRAh01VtDE0nxbaqH|M!cR&`wk|`1&|Y zyCAbOl1HLt{dT6J8)=rRs5=;_sCRmN{M8BgPENCa1huUXvb6WPiq869q*4FqlLu$% zaUaKZwCGe{)4sv_tJasJb{QHkLCKkeYYF=jWI(i^q$`*zWEF(20+alb^P{E@#FhZI zU4EjjfKRIDd@X65@4~4=`;Keili_1YWJ&qCS{J`rm5ax`O=yxYVIXtVze9$k4Y$mX z-v_U;VeB~@LCRyc+aq1FUhLk5=C6lSP=rspV+9Pne{w#YZ|*rB=g7W;hv+HGdm}UW z^`kyoH>Z{UUid6+o)jAxDw_wFtLD@>3KZd6Rfo0_r*9%x_ipBfI#*;u8|;Lz1vsAShn22+e62n!~3i zakwtTD*3j>k9TnvhCYLSqv;B`y4m2cm_u0m7f( zd5hX}Ff=jIJdiQqP)F90o0w8y&)e9-ApU=0sFndpj$^1c@4E^-@?@QOPDqHY4**-c z-OuQ$Np7V}Hux+ZBH?8f{m?Pgr5vMU>I#yrH`p?DchtuD?=4ctaa(7!n^+_%b`Q%$N zmSA-bmS6#e$w?`-Ck~dOJMfuU{dgo#Os?0MjMW+qgP}%4ODW7B$5QN}ukvS9Es+mR zf4Tc$p^bC82#iwd7ZPLt1l}Ms%x>ad6dW$Y%y-y<`!kNE+F;oXEDhE;U+xW?h5E4w znNa#!h6zOmSg&9y_Hq4;rQu|(0%*Xxk=`I-xmoy>NhN3omM)om2^2YwrAqw^J`FJy diff --git a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/PURPOSE b/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/PURPOSE deleted file mode 100644 index 4bc7058..0000000 --- a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -Description: CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -Author: Martin Cermak -Bug summary: 0 elfutils: eu-size cannot handle recursive ar files [rhel-8] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1646479 diff --git a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/main.fmf b/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/main.fmf deleted file mode 100644 index 65de371..0000000 --- a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -description: | - Bug summary: 0 elfutils: eu-size cannot handle recursive ar files [rhel-8] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1646479 -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -extra-task: /tools/elfutils/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files diff --git a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/runtest.sh b/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/runtest.sh deleted file mode 100755 index ff22f65..0000000 --- a/tests/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files/runtest.sh +++ /dev/null @@ -1,42 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -# Description: CVE-2018-18520-eu-size-cannot-handle-recursive-ar-files -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - TMP=$(mktemp) - rlRun "valgrind -q eu-size ./POC2 |& tee $TMP" - rlRun "fgrep 'Process terminating with default action of signal 11' $TMP" 1 - rm -f $TMP - rlRun "eu-size ./POC2" - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2018-18521-divide-by-zero/Makefile b/tests/Security/CVE-2018-18521-divide-by-zero/Makefile deleted file mode 100644 index 0f5c03e..0000000 --- a/tests/Security/CVE-2018-18521-divide-by-zero/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2018-18521-divide-by-zero -# Description: CVE-2018-18521-divide-by-zero -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-18521-divide-by-zero -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC2 - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-18521-divide-by-zero" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1646484" >> $(METADATA) - @echo "Releases: -RHEL4 -RHEL6 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-18521-divide-by-zero/POC2 b/tests/Security/CVE-2018-18521-divide-by-zero/POC2 deleted file mode 100644 index f4edc4036c5aa8ea0ddd75ca50366b7c3378ed3f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4000 zcmbVOTW=dh6rQ!$B(W(C2%<;@X)Hx*iki*(633tjZPli=B8pHiQjn0y+Hn;wNl?6~ zg%|b(sSIXkmn+btYv&;87t*_r)z>O1k-;OM>T z=G~8OciNj;sL^V-o1Ip7`yH)Aa=KjWZdWo7s;MG+$q4m>k(F^?*4B(|WgN$<-|yqo zRD;0)A5vN-6XLT23GSbsJ1rKnwkM_#P#Ik=WF79j&N@6+fCrt(<@q3gg(Y?rMc zHN7vkOu)9SkJM%GN%vf@rHt!sx(R64aTR`k?wyFj2ZPm}mxOZeNtwBUi+H4kqTXGCmK-J;BPm z*Wb=zW%Grw@>&insaZVFA9LFVD=#osdT^#9)uk>~l#k8D&_{rmhj|Pg{znX@Nwt|; zxP5`*VX0kv28L2f#EFbeDVw>oR0pTb1jj5#U*;@ptceP^GX+B>s%F*8slh}CLzlVF zLVbpz5W(+X`ozAA7;3-7AG48E?kkk_VmQN4&~2qDd}4(9&`4M<5Hv4Xgyt*^P2p3M zJX{xIm3-Uc$Fn#OL!Ut$>7Ef8cl$?uvTsiGWgZ+yFckBRe{mLuN}2x`4`de31_*b4 z>&^IrM!1=#0RLcNH7BN)Q{jLU=JXt616B1(U1HjgP z|1)#dG;XCqV(-vTiOx1UfOg~bf~ zVj64YOy_YH3ua^O)nxcwtbI89zDire*pu4R2C7T4>BcAD0$GB!DOmC?n>2aTO7+CS z(zhF?>fn>%C(rcbi8?X4UoshMH5yb;8d^$8eMFXJZoPxGDzqu2aeeAyEe51tltrw? z4D;3gjA};4ho;n{z6TcC*ptn`h*G~8QTS&p8b1xQ8x`(BGEC)w>w6%JSgQ%^=3uS2 z&h>IG+06BiO~`~2XX!_vEWyeq_m$%n> -Bug summary: 1 elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c [rhel-8] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1646484 diff --git a/tests/Security/CVE-2018-18521-divide-by-zero/main.fmf b/tests/Security/CVE-2018-18521-divide-by-zero/main.fmf deleted file mode 100644 index f288788..0000000 --- a/tests/Security/CVE-2018-18521-divide-by-zero/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2018-18521-divide-by-zero -description: | - Bug summary: 1 elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c [rhel-8] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1646484 -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-18521-divide-by-zero -extra-task: /tools/elfutils/Security/CVE-2018-18521-divide-by-zero diff --git a/tests/Security/CVE-2018-18521-divide-by-zero/runtest.sh b/tests/Security/CVE-2018-18521-divide-by-zero/runtest.sh deleted file mode 100755 index 4f83999..0000000 --- a/tests/Security/CVE-2018-18521-divide-by-zero/runtest.sh +++ /dev/null @@ -1,43 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-18521-divide-by-zero -# Description: CVE-2018-18521-divide-by-zero -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2018 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - # This doesn't reproduce on ppach64 and ppc64le. - TMP=$(mktemp) - rlRun "valgrind -q eu-ranlib ./POC2 |& tee $TMP" - rlRun "fgrep 'Process terminating with default action of signal 8' $TMP" 1 - rm -f $TMP - rlRun "eu-ranlib ./POC2" - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/Makefile b/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/Makefile deleted file mode 100644 index 075bcd7..0000000 --- a/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c -# Description: CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC2 - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1651203" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/POC2 b/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/POC2 deleted file mode 100644 index f4edc4036c5aa8ea0ddd75ca50366b7c3378ed3f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4000 zcmbVOTW=dh6rQ!$B(W(C2%<;@X)Hx*iki*(633tjZPli=B8pHiQjn0y+Hn;wNl?6~ zg%|b(sSIXkmn+btYv&;87t*_r)z>O1k-;OM>T z=G~8OciNj;sL^V-o1Ip7`yH)Aa=KjWZdWo7s;MG+$q4m>k(F^?*4B(|WgN$<-|yqo zRD;0)A5vN-6XLT23GSbsJ1rKnwkM_#P#Ik=WF79j&N@6+fCrt(<@q3gg(Y?rMc zHN7vkOu)9SkJM%GN%vf@rHt!sx(R64aTR`k?wyFj2ZPm}mxOZeNtwBUi+H4kqTXGCmK-J;BPm z*Wb=zW%Grw@>&insaZVFA9LFVD=#osdT^#9)uk>~l#k8D&_{rmhj|Pg{znX@Nwt|; zxP5`*VX0kv28L2f#EFbeDVw>oR0pTb1jj5#U*;@ptceP^GX+B>s%F*8slh}CLzlVF zLVbpz5W(+X`ozAA7;3-7AG48E?kkk_VmQN4&~2qDd}4(9&`4M<5Hv4Xgyt*^P2p3M zJX{xIm3-Uc$Fn#OL!Ut$>7Ef8cl$?uvTsiGWgZ+yFckBRe{mLuN}2x`4`de31_*b4 z>&^IrM!1=#0RLcNH7BN)Q{jLU=JXt616B1(U1HjgP z|1)#dG;XCqV(-vTiOx1UfOg~bf~ zVj64YOy_YH3ua^O)nxcwtbI89zDire*pu4R2C7T4>BcAD0$GB!DOmC?n>2aTO7+CS z(zhF?>fn>%C(rcbi8?X4UoshMH5yb;8d^$8eMFXJZoPxGDzqu2aeeAyEe51tltrw? z4D;3gjA};4ho;n{z6TcC*ptn`h*G~8QTS&p8b1xQ8x`(BGEC)w>w6%JSgQ%^=3uS2 z&h>IG+06BiO~`~2XX!_vEWyeq_m$%n> -Bug summary: 1 elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c [rhdts-8] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1651203 diff --git a/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/main.fmf b/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/main.fmf deleted file mode 100644 index 645e9a6..0000000 --- a/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/main.fmf +++ /dev/null @@ -1,15 +0,0 @@ -summary: CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c -description: | - Bug summary: 1 elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c [rhdts-8] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1651203 -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c -extra-task: /tools/elfutils/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c diff --git a/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/runtest.sh b/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/runtest.sh deleted file mode 100755 index aa345b7..0000000 --- a/tests/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c/runtest.sh +++ /dev/null @@ -1,38 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c -# Description: CVE-2018-18521-elfutils-Divide-by-zero-in-arlib_add_symbols-function-in-arlib-c -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - rlRun "eu-ranlib POC2" - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2019-7146/Makefile b/tests/Security/CVE-2019-7146/Makefile deleted file mode 100644 index 1dd17ca..0000000 --- a/tests/Security/CVE-2019-7146/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2019-7146 -# Description: CVE-2019-7146 -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2019-7146 -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE poc - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2019-7146" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils" >> $(METADATA) - @echo "Requires: valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2019-7146/PURPOSE b/tests/Security/CVE-2019-7146/PURPOSE deleted file mode 100644 index 0770c49..0000000 --- a/tests/Security/CVE-2019-7146/PURPOSE +++ /dev/null @@ -1,3 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2019-7146 -Description: CVE-2019-7146 -Author: Martin Cermak diff --git a/tests/Security/CVE-2019-7146/main.fmf b/tests/Security/CVE-2019-7146/main.fmf deleted file mode 100644 index d690650..0000000 --- a/tests/Security/CVE-2019-7146/main.fmf +++ /dev/null @@ -1,14 +0,0 @@ -summary: CVE-2019-7146 -description: '' -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2019-7146 -extra-task: /tools/elfutils/Security/CVE-2019-7146 diff --git a/tests/Security/CVE-2019-7146/poc b/tests/Security/CVE-2019-7146/poc deleted file mode 100644 index a27f86b3f45ace72b0347dd898540e4946d33e4d..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 428 zcmZXQ%}PQ+7>3`Yla3V?oRuJSmTvqZ&IPnETPT`gHy}a^hYb3mUAYKB@D>WZ1#h5r zD=$IN_TgGMz3({*K?BdseBb;1%{-sgtB&JfyAnu3*6FLUKF?J)R(yEKAdh3@kfKYP z|H2sJF+uFmXGoGXX}5>Qwuhm0DY(BH-BEoW0CUA{1`x`}QLJwcfX$n+qRgZPNg)iw zHIQJ~{vmlcR(#VIn#;h8X6P}#$Nr*1ztC*r;_JRUPXqIjv7%0&*y=6nH2*Et=XkiJ z{&zmZUJ=xIMJecaNj9& M3FYjOac%kW16b`jGXMYp diff --git a/tests/Security/CVE-2019-7146/runtest.sh b/tests/Security/CVE-2019-7146/runtest.sh deleted file mode 100755 index fb8cd3f..0000000 --- a/tests/Security/CVE-2019-7146/runtest.sh +++ /dev/null @@ -1,41 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2019-7146 -# Description: CVE-2019-7146 -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - # https://svn.devel.redhat.com/repos/srtvulns/trunk/components/elfutils/CVE-2019-7146/ - # Expected Output - # An error instead of segfault. - rlRun "valgrind -q --error-exitcode=99 eu-readelf -a ./poc" 1 - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/Makefile b/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/Makefile deleted file mode 100644 index b022ffa..0000000 --- a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read -# Description: CVE-2019-7149-elfutils-heap-based-buffer-over-read -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC1 - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2019-7149-elfutils-heap-based-buffer-over-read" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1680056" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/POC1 b/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/POC1 deleted file mode 100644 index 63698a3e8f18c2e78462cf60faac676bf5000912..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 3208 zcmb_eUuaup6hB|GwwYqJ#P1laJzq6Lbj0f#`!MY#7h^?)Tl?UL(GE;QPLF ze&?L;obP;p?p;6q!gPqSgWyv8cUX)w;@7FmQ^zUSBRPrYVHk#BVdlzD+u=O`OSg%= z!p$z-at>c5?yrk~{^2~%S-AL3$Vq%ovwT6_9qKOKvIn`eL(+BJu=P<1XB7FJY{A_dG7xw;KdD zc<;$rA{vejvZ22CBd{l=!ikY^WGZ?z`t-S+x6s=YR zApBgjaWF^#;eIx^I6C*?&6|-_JB|sqITes2dI%fsX)>$k)Kf{N{<32k$0~+pG|eJY z>RPi{J+_*gP$sfTrIJ+2En6$DC>YB&igu$ZPwfA(WIcOGEP3)jmz)wSuBb(5nQs~P z+BpO2i>3vYT0_@rP^@ZAfHQ@{RPvbxz7u?j;febqpN_A#4gGUDR`sE)=!V3;J$f& z6yU3VSN>JNc(r*Pd0*)k6CJ`vb9&Dhfe?pJ_z1Ai6@~QASn?&Vm;V`^s0#e zSwIoY72ngY@vn>c@|;n8dJlr}-$sn#c_aE6Ut7*#cR(Dd9SMk0#+TzJ;>62!O7oB? z3Y||sNk2JWL#5>Xc51hx`fTam5#7L+#O6D{c@!Zn{Aqvu6xr}g03V~+E!0+*{i7-c z>qqw^c=ss6rkHe#1Rn+0O0q9^&vKPMc1Urde3*D_!T5Bh!tLL%Cn5`%Hv8T2s045f zcg^(84qcWk0IiFN!qcn|+)r^^)}3&&dC>lWYv>&#BHXJ7er(bl?R>k12;)9Hj6a7P zTyFn3C2*RD)-2-|1TOyp_`e-uGXf|3VQkWVUf|Lmf1^0bpU9v+y)8s!&;J0q1R%=D zapJ|Z@f$Nit#f|F(f@D7_#TzWmmq@`71-fI}CnL4|Uz{!0U1<%!g8v cr8qBenuWGN9_woYr_f~owUDm|@Vg}c4FTVO1^@s6 diff --git a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/PURPOSE b/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/PURPOSE deleted file mode 100644 index f09b1b4..0000000 --- a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read -Description: CVE-2019-7149-elfutils-heap-based-buffer-over-read -Author: Martin Cermak -Bug summary: elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw [rhdts-8] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1680056 diff --git a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/main.fmf b/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/main.fmf deleted file mode 100644 index b598856..0000000 --- a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2019-7149-elfutils-heap-based-buffer-over-read -description: | - Bug summary: elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw [rhdts-8] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1680056 -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read -extra-task: /tools/elfutils/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read diff --git a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/runtest.sh b/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/runtest.sh deleted file mode 100755 index bac258f..0000000 --- a/tests/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read/runtest.sh +++ /dev/null @@ -1,43 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2019-7149-elfutils-heap-based-buffer-over-read -# Description: CVE-2019-7149-elfutils-heap-based-buffer-over-read -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - rlRun "which valgrind eu-nm" - # With RHEL I saw the invalid read of size 1 on aarch64 and ppc64le - # using devtoolset-7-elfutils-0.170-5.el7. I also saw it on x86_64 - # with base rhel elfutils-0.172-2.el7.x86_64. - # IOW - It doesn't reproduce "everywhere". - rlRun "valgrind -q --error-exitcode=99 eu-nm -C POC1" - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/Makefile b/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/Makefile deleted file mode 100644 index 99a9c61..0000000 --- a/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom -# Description: CVE-2019-7150-segmentation-fault-in-elf64_xlatetom -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC2 - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2019-7150-segmentation-fault-in-elf64_xlatetom" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1680046" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/POC1 b/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/POC1 deleted file mode 100644 index abd8c65934356f96aee5b45bb9a61fc469499471..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 10442 zcmeHNeQ;aVmA|r`L~#;Hah${@p?L`on*vs1C|MJrNQoStSqHp{4e5d_%a&|wt4NOY zlsFk?ajTf-RhVSjPMfwn9i}teW!lbeN`aIln^ip8(b*S z{?7f7o`to|boyVpn)l8vNRKTc1B;_Gds;`(l zGArnNpAxL1jA$}*l4 zHkQl0A}drz(07S^=ITe5{(R(JM_)(4b<@fBYc@2$@YcEiddG2Q`_`qu_@A#mc*}+K z(w~0+{hFz&Q@MR$rxO?`gFjaWcL3LLm8M?rzb*OtMZ zW$>ml_;sjP!&RF408H1e^T6ll-zyboKP)5vi!%5vz%^W@>30C8tM}nD_&=4wE6TKY z6XZ2qrRhxo^D)xLwJu(yR*fNWHLRMAReLzDZfB4o`H2$wCnY{9akUzF;g5^eu~CUD zJG+soVGee3fk#1{>RkR)ACqsFc+>K(De@nJBY!lBEB~pd2xlcY!@3YKj5w_Xjm+QD zzR4d9#Y27Jgb|9jZ`u%vMMLd@?nsFF{e9bFQGdb+#0|fn`S04{-z?=eL;{IKC?V9R zRi-NZeIbMKOa#`Mzc(BWGe2$;O{n5{Xj^PYh&<~dx7M=IAY@P+iS-2FNo>FfM}ur2 z6pzQ^EZ76PMrhDr14$!6x1Rn$oF$B4ILc52X<}kYgKY~$V1o1m@je1!f%Wc;hm8>H zjfVn3);kanM~zEri^|$8I09TqTP=8X0cEVKzKe5YdyWO~x5&@6-~$$X zo&_JY;9|cc3WqGX>U%2LYr*GR?CiJT)^+!Q1?Srksq>fxUud!OxCLKi!4F#S#THyo zy=B+aGp=5!F?~2=%*fu4Ue;45?I(m#{^lAKFLnAlF z`3mA`NaQk{|DYCpCGiJ2|2*+Db#jk!{w(n{By#&X{~GZ$6mmnHe~EbNrrbbLpSnKR z#rc1ya_aJ28|RM`PhFk!aQ-my)Wx|qoPUCN>e`&f`5zKbU7B-o{`e}{PL z+S~+ogZY(TBc8f6H_rL55>H*38{_SYJKgJ?q%i^4YWhun8UA{H^&;b~#L>CiCVo=N{UnjCh|+P5zbh zD<8mozW$k}#U2a*ICcKquZRx6?i_v<-RS)#_2s#rIhPHA3jA3>7*u0usrQ#O6m%2y zo%=fUys1Cfocq2l1pbu^P+Li$E*FCb(vCNE%9isN`4o2Hw%pwSdY#LBjQPyTRL15t zPv_PV=5{XIL)A+RVu zew5FrkJSBM_<5)AI2eSg!e<&N+w&~cosZI<3}B^m zPcL}ns+_|&BX^XYbnbZxs`|)-_1e$j18dA&{E=z`ysd2=@zraG*#u*)=9{|tyX;^8 zA)g=4IEQ}*HE+7M-g^XwQ1wH%pYy9ONUv_pi$;v25!oPAT1IwO>E>zOJkyvl&t?OF zeC9+8I?H=YRsBEI|4mQplU2>b=QoYqHaB^sW#pl%?D-F;$UO9lH|?vhqPly~9p^sp zO}%AH2KCf~7@E#KFT)KzjeKK9Pd%Hz@GrVKs=q&`r?NH-5zPnPS~N&Q8+632PEQ-? zl(1~g60`=jJBQy!W3Y-fHD>Pb^giJ2^nStXKOx%U;(eL@Cfq_F-Z5VjeVBa;Kvu&j zpzh#iDNgwhC{D&tkG=`D?5mIwRxSuDZNkd$U9bW@JB9;~O|}mOM=7M)-%ySop4k)$ z4`+1q8RwqsQN|l1Y8v59I*uAKGc_*V3~7pz8Ka=YHsj&`T#wW2cKTRJA~K1k(i z5Xf|-UgO<0gi5Kqo`UDH8E4G1=(NU6_9ui1GYGLTlAiaWQ)AhU7`e7;;+Rs3Tx;$qmy>C(YyU8FA>R!sZuq0*gMox6eRbX@dBz&BNZ!Q%43T*D4 z*HG|1Dp*=5_-86u3k_l5K4M?RJQnO4v^e)X*y8HKm!8J+E#`Ay(9!(V>l1D5EvGY? z1s=Q}IM&9=>9)D3;05{ioK&I`oE75Ir^N(9Jh?EIEWo^C#~7&ZAV2ABXTB z0$Jw?de9atJwoLj`j_73298~>gaO^0(2r&B&~2ym=Pnxy3)be4H3QbL)OMZ_^$*=1 zaA??>&hLO?Hj1&*d1}VpfNU3eO-EgLbEBv3V96PLi7ps>mlX12ow?o6Df+X8heuCe zy#O|jyog3O=CgNB(rCMVVxC6Rsl`0gV!nu(pqnpY*!>*}MZb+9M~^(O$sc*GBP+jG zt)X!v4MexJn3r127aCt~{mdJDV{+`H%Iv21VR`tx@o5#GR`YDDdC3P0`Px_X)Crq@ z%emxP+Ot^Z`u?K77f&G4w9S#b8rqUm>PQ6oLhH1Z3GM!d*3DbCcWMm@jm}4Ot^jr~ zXLbZ4$xx>@5HR{Vu3e+yB&2b;S`*1?qOWM8s3YYRxkkgesJw~z6`2sHG%i}=2U?;v zL@X|=dQ0gw8l42WiG(JNAO>_2LnMTQT5mkIP2;CIEf5WA4SgCvuoVT27!~7uC->L) zL?gR299y+mFCuyaG;qal&|-1&ijIIgLqW)Twcc=qAL2Bah~YRHFrXCG!sNpCWH`>n zm=|3V?oOg?#mdAA9(~9Mw3R`vdlyjN6o8zTT*!|z09Vw(BOr9elO^Y7xVd1&;xk9Y$b|k*+IfV>+odM@f7c( zCnQp>Ak4OVGqVl4Y)j_OvhTOeauH6i1e##uIw?bBdU?j`QAYCFck}r+vh8qfbkyDD zoU_wD#O}E2*6VJnUjdZs`#{HG*F%8U;Y!tD$BFC%xa{!#C$ybj?{Mv_SnsHNw6fWu zja037ta@aI&#~s=nO;XzYSw1QK;>PP)sChOjx}D#s`U;HqEK1yuzUGQo$B~8u0yCN z1Ujufo$Tpk?;eL|z|rLWm@)3}dr&8T#S?*yeUd(j0Jb~%PonUb7=iH`4{vrxQWXQa zq!wO*DxO~bQkpAB;q!!gMW{X}6kge4t4&G0s^u?Xz|$u@N_JUJ>n$Z!{=b*=G2#a+ zJVXi~dfR3SUcEZCR|;NkRoG7HC|@|CSBHzzLO}}mN|n>PcuuW{<5FKe8`P`V#ZrF4 z?%_FwcS&CPy=Tv8qrj`OPC3CWMn685E;Dqonsr+AHY}NgtN+Xvo!@m=``Ijem zJjTD=xI_K^-Z+k2{{A40C{C#Q1MzrZ7vmZ#|Mxu*Lp6bI;U4%9Gek|o7`_5=zwi|e z?ZvnDFIoceCuV8#&^%Csv#G)ZuJ{iPHCZ``o18O><=^gUf{^|YuJ#HK?!|vVXq+qF zs)|{jTaNoBObAuKS_B3q@Q9RGdTR11GuIZWD_aQ^EQTl3;>XL#kDOegm)&79gUoYj_pB6?{ztX26NFr*H=HIX@ zvv^nlL{f{t;EHijd@nLq{fTN1FPf10d{eH3K~;Mc-44vE?~&_-M?STbzsf`@zq>@A zUT{%rllpPB`g62czhv1EGS>RlL-C|ss%I-fNmV~6_+hE9`fm)coG6V+{l`lbO8tKn zvQ)p)SN|AN|0KGNj9F5NIrfhzv$4|G3pjwt4!(_yTT*HLKR}rSmz-vne^?2nQu$K; z35Yo@`f8J4m;byfl`rLwK$l!p_0#)4O0Fx^KLJ@9yGma@B-KB^#%23y{!vo(WBgsF zeRL9+wSM)DdvX~`7v%+4Yp`T|O<`iG?cAx)^b_`hZf z>IMH5@-i}HOSOMo>W^wdVyhs9yMzn;IC3&X1&lIEU(HihSSoAvUC9uAQ4`!df)wth G`u_)f$NUZe diff --git a/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/POC2 b/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/POC2 deleted file mode 100644 index 0c1a4d0ddc99da693633ee0fb3c0eb453251fed4..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 10467 zcmeHNe{fvYb-pXf_FA@g*Rl)>Hu1HQsYB4(g5U}RVb_+-6O}==C2$JL>Pfqjwps7W zyKimT!xS}ZQNJ$2o-~utrjubZ)0Cl|)*(O?C$-llV|l@aHu@d?PfGd8|b zuo7!x^O=t=XUo`JAaii}L&(vW%YXJ?-+JWsi|OS*{=r8zGgW7D2f)rIFjxkE zxeV?C&T*BdUjmrT{(J;xHhftb{Ms`3@iO*3W#n%xgS*S%O=a+#P%p<-n)(6E)~@qq z@Mp^4KP!XZ4xHmEO}_##TfL8!!T+WVUQwpKTOiMIm8N$AEXGKm3=9&q;h*;%eUe;g5&av2lqjJA09-VJ>!ZiBCa-YC`@CpONp7c+<-6 z8Sw<0=aasu)S)jFJOCT7Ehx)?_BNXr0vMCaahC1|~NQeaj z{X1gOK*G@DMj*ff_wEX8m2#URdLj`@Sn9JXQx$>!kikSI0_!Z$7mkKm05^#yRB=4C zBep9se?BGANG3dUbdb8#KbvAR7$D2m;4X=~)WF9c-qA2Ayyuv2G#)eng@O3tv>Q<@AhEtnW^4V~zTP4kgtGPvG?KT_% zE~M=?yt;rg)@{QV5YDZ_0UN&1g2a8$hA*<=LpI!P!-s9S>U%2QZ^IYc_g~fEp^g)!V=2gR)eDa z>RR00D}2ZiKR|`K$vo2PYT{{VS+_2zZC!U5tZm_6NU7za~{6AAUb$PB`@W+X#uFm-cf4IP}6a2HpQ`hFW z;GZF$x-{nz{11qysh4Ad|109DYjaaq0IdEN@zkZcNx}a)@zj;M3BiApc$P!dc%z@FMvi^gqzjnD=-3J6akqcWyI3)yzx&f1-G{G`@}AY0}bP&8|nq zNA_RiV~u&uobxm+X16KmD8(+@Oso$QN4MgZeI8X=x$hx&y1BlVYSWMr`((<9*>mu) z331K*PxJlkN|;DZ=gnj8eY8s%^*@)I{yq1feGJ8X{fkZ4`Y-_C)cJG2AUg84d*m&2 zqyOjBm*;-sUNH=6;V%KgpqfBS{XeInpqZ%e++RS?pZcxCec&%GfqxVN)K(Ix%f;Y< zwBt{ma^wO>Z})9vMWC8uMmby)*lbPxJXSGFtjB5A-ziRAa{d!pqqd z@azQ`Or3Y!(eN)doLQ>dmm+Q>Poj}6Bl*J=bglQi``ek8k;__o`MG9y%f)m@eXaY2 zjDP;AF$&hmEAHmwU=XT`X462~zL%ixeuDO704v@5`oJSs3lJ9=KlHHriaz50g@x`L1UED*OAt&F4ol?vbBB&7ZEV z_aA{(`0?mn=K`uf(rX*@R*NRlqHGWW^<|)J?Fo@s{T*v z|Dd<+xvG|t^IJymT$nu4I{Ii;_WUO^WFCFfpKh+NqPlz0H|M_QPrc_z2DQ{97^m)i zZ@>*LjeKK9OTCo8_z#*nu6;D2rLqo;7v2orS~Q5G4H|-2r=<<_P*}ER8Crwd-6I#! z7%XW`jhTnK{15xP{9pG6PFQX6h>p#E2X3K5?_SKU4$VFfAj>f%sBeT>ic|h$ij(o< zqwhj3`xay@D;F&*?Ut3_cwhy3PK*r^n`}P{j#5ao|3Nu=l4esRJd)AO7v1~5j55&} ztEN%Wq~oX&)07M87D!W+ypTkjk~_8D4zxSHs122g-qJ9G4?rqcgFvPu^;~q5+)+%3=5$cnWbDmDWK*}< zY&L&w8GX2DbkQN0f?L9J_7Vy#lV^SdlMz~=MAPEjjRIt2I@V8X3 z9tDGp-F z{lj%T$Z<*3bku_vHd^X#mYgHj>w>WlNFhJbmD>xQqCeY2c(nBOOJL*3YiM+1K6}qJ zjkdd{7IB(Rt>&3l^EJ!_&3qlh?vGGt_1gq;^!)Ri;`!G$y88Ro9E}@oAiAy9yxeNO z+W1D>m);S(lw+S(X19C<%OmHFFCsn{@`z8HdA7~G+zbo(+Bdb-35Rz3x#U^ez}V*c z!J@yHP9V~>=aE|++MiSEOz8cg4SaQiKh)5+b=%G^-jLvQSfWD)um=RQOOGT&U3^eC z1_aJ;;5Zg>0atS?*-i8pO%!#coFX@H9FoeLh+mZn>&PZVOZ-4fctgbIvZ}X~-oWWt zC`=@{G=dn=u?&&09OQlR*bXj^c3h7Jc|$)Jr?;Yj5u;)p_T*;!{%B+m#~GH#`Vi5Z zp@A!YGmpi|D>@JE4h13W=Y8RbIMH#Kh~aFh8&Hb!FuAZZ8IB7v=0}%=dy*(ywK}m% zL?7}xUmfHe-y`dn&VuWK+jMCm}me}yX zhW-ul4UwG~uIgk>wgPmH-xNzmf;<{CM1(}B`eI_B7fx}sbW)>R48J2ff~=Gt;-gg? zU27hn)9hOJ*j&G>DK&4aYq0X(%4%2BCf7Q@Yt2R%hbUAwx}1J-qNh6k9@iM^34zXP zPa}I8*}LE68+0}KKVwYz`ytfHU+ZB(#y(G?c(B<+)Qm!ywL`W;DsDCrB5o|5$6C4E=Y%aYE;5tPz3lHMrkdPzm0?MAym zZ!px8>}TwS3kMc3Z(<-}#0|ZNdGT>36dz<>>?}iG|Hjq^L+@wa{%F!WpeF{HH@GL7 z*t5f;*w%`YU7>ga+twLO0A=w|L?;EA8;lraA77fh$a?!@$cWEMUh$#I8;^+(J>Jkj zpf8R?SzsUtBZ{+B1A08J?_oki<^Q-BVyH&n5$=T#F@wwlp|3_>d^8e%;iDVci%;|4 zum$3G%+h?Jp|8ecQ-u#)@vj?dehLsbIZYHRKK0X_Q2HGeK2fIr8o>ouyj2ymBDWIv z%a{X7U(Nd=2|O<4m7bb!%FLIMp*ARewJtd2MAsyxEgJc*^ws>l6&Q&qeYMWC%Y{a* zD-aQ>wEcGgr8%wi)jS@T3&m!sr~FrPifSmQHA3-fo$yFU+oeAFPcq7X39|>0A=^q{ ztxMff&?5y^{m%R+0#WVPrT#`Kr`EYCsjt>W(xpet7 zQhq4D4;j1uRJBhOO-X&RH&?=-qCL2&cI^aa*Z0YF!Y3b8%3o!ol;2yTPp`lzwM+fD zTJQy0tXHyZ7#Vy0>N$8)uFmt7probke@yDD{+qx{DM}Mk|LGEiQvaWTEY+{{)nAF! zUySY~W42Ucj{P;t?D}JMJ|R6OJNQm2w58Jee~2;{E;-F?f4#DlO65!WXCdac>8pK# zQ~o8ZRKAoy0$p-Z)lY8(DS56^{{&=d>?(crTvUGvo0RRR`A13BkMVbfw$n*m_WIQ) z@#z&LU6i-DBCqWH5(RdB#=9+1ZjmvI6z)n-(N|Go*B_JmW86~luxARolu>#Ld_!WY w{gYCEoLdsxm7t^&E})ah$q*GV$|!v`PgP;5tlf7dL-aLnaqnBCa4*&WAH -Bug summary: elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c [rhel-7] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1680046 diff --git a/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/main.fmf b/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/main.fmf deleted file mode 100644 index e2f01bc..0000000 --- a/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2019-7150-segmentation-fault-in-elf64_xlatetom -description: | - Bug summary: elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c [rhel-7] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1680046 -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom -extra-task: /tools/elfutils/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom diff --git a/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/runtest.sh b/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/runtest.sh deleted file mode 100755 index 3151176..0000000 --- a/tests/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom/runtest.sh +++ /dev/null @@ -1,40 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2019-7150-segmentation-fault-in-elf64_xlatetom -# Description: CVE-2019-7150-segmentation-fault-in-elf64_xlatetom -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - # An error is expected (2), but a SEGV is not (139). - # Reproduced with elfutils-0.172-2.el7, verified with elfutils-0.176-1.el7 - rlRun "valgrind -q --error-exitcode=99 eu-stack --core=POC2" 2 - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/Makefile b/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/Makefile deleted file mode 100644 index 352a559..0000000 --- a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -# Description: CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1679071" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/POC b/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/POC deleted file mode 100644 index e449ac211e908c4b89b33586751f62d5c5340eb8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 10393 zcmeHNdvH|Oc|R)&SOn}YLf8rqb0Jbf9BV;#Ol54ByCC5!SJ)~DOlm8uMZ1!=S$4(l z6$r*tlrD0(k!6@PlQ>ByvsyM2_eE?Wn-0}9Tskf)y5tm{fNLs>x`oJ!K}&Gex@`MBqD4CH zdAf*83~h)a-5@y8o>YVAlI67cy-x{IQN}c`AUlec-M~fAR>9n`j?02x1%)WtsF`W3P0wpCwP z5erwxqVevY>YmzF)vLbXPbK^}^L}GqF-px{_iW}FQhC(4HDmKYY2c`m;@A>S=0-Y;8M z|H516{`DQtnH^gf{ro?_{@`sF`WOA=`|p<#cB*m!6_WwF$bbf$&z>=@mE_a7CIfq* z*Kie>2iVCvd!AKy+@w_}Z_*M;tvaTKVzI=o2xC8-0{`Y-`CHsI2TDJXA3o{J?Rr;^%8N_(L%W2J1g zR0o$gJpPtVo$LOHX?Q8OqDX`VJGJ4O61gVQF=ag6~0;OYnQevJm2$d ztXgVQlX|rg(pEp05?!EY*g!(2nWQbFh6Nkqk>=30ScCJ09E~%? z12hTyyUj)0Y09>deJI&MN}U>GJ#z%TAnEuV{jSD_wd;a6`)~H&$^y;J8-q32MkTY7 zY>KeY&{kif{_Ovf9MuUe)e4?C7uPNXr9VQTyyIfu1))S}xVjfaXA<^{7*i@P*b}P~ zm0bQP>Wf)~k2zyqTrOg9iJw@~N@jcm=aZXDco@n#M#lu&&{a|Mk@U2|t1{uhtH(dD zlXHgf%M=(?%`wt1b?7UkA9@nY5P7YZ(+{DC`LaBxm;1P^TFLbb`4gSmP^H#^r-zm* zx|4uFWmlEs?p>mTBe|0*vt!uI?W$6eX})Afxm-jt&6Dgf zmp>?nT#OS)_7In!Cz;k$_A!#bdX{9GC)tC%{?{ba{K(>v0{<_OO!Fe!#bs_!^C8>H z<$t1jng`h?E*~SA#y_ib`7p^e?%9=Gev)Jw@2tkRpp2=8qpXZEdvYo08rU7B(gtNsqx|JMWZxaPa|^KjWgC+3|h@_<_XdXH%PH?(m&@z zuf{U#DNNcjGdBU09m0aB>kmtxjJ#Sc3rw`s!Sw6nP0bCbhKJ|r z*g20jadN6@HX6AP(Z45lron%~lXbIEJpy8+Cp?Dr#?FO<$R&TC&TSc@3VRITeWYY9 z$LTSeZ}bS&Z#KU2Hg|CJaxokj*0^yrv&L|pG)`YO=jXi5B5x+VVIyrhF52(CGvv{5 z7@fNrhM72KL(9o&_dw;k$Xgon;e2kS*Rbwsd;`uodzTFC(U$BU*yQ8c#M5K+FP;Y< zM_xpyYwXNj6MVsp&(UbXG+1XEtQRrY4eKRLtiM2|7`IVy^gs(({DIauQ1!i14V@dP zCc3G?y3}C3Q1f!*=icDQj-wwJXEwY~>*Bn5gUU~%b+*yER0j`s`71{HxXZZhT=!Wz zk=)-BP^k&>Xb%rJMqx=2y|Px zurn0vjxnSG-L0`OR+asWl;_MqbSpg}QOX5j zu00!>tH=7CvqyjE8QM;5EWCR*5>oXWq5#Ci3m^t@l*i?VYvD z-OJW2xc$akDwjda+p7Z|gI}E#0go?ThBGDD2XMI&`xA6}UhDB4C|c{Oc%-=AqYad- z^(=pQTAgR*L(>DE+VqT#p047%i%UJV>pUw1p5<#j8lW&)>v0G8%Q?02BV2=MCjvUD zKZE=k28mVb7E zOrHj*xMe-`<%@nE%sh=;Y zBE^c)S~;io$T4ZJo-gW)teVE-Zk^+mzE#R9?t{FR;RkO~RQq@je7^jSJrT_@>hBwZ!xdP%oP+Air%NgtB*o09%O(q|++ zDe1pS`lh6pB%O};Oe)t&`WZ=ANy;l7H#!CS!;x*>9gIEm_JLWx!A=A3yo{!TLKAVEFGle*SZkKbZ)J%nw_Jv7|ewp5D873BTJPv~EEB;tR`(t4q(ujXTIkq(Le!Ge?AKUN4y zU=>f4zVOnTQ1;D5I;8x+Flb!L-%9c<=a%Ar32Q*vt99Qa6%R|ivQz6#x%oU8>VvXZ z`+{38bVE`)qESDUy;`5QKt~W|ulAWH`BRPBR{-HfZWBsmw}YcKt?Wl;=)7)3ZWQY! zQpK-uiW;b=JwnN9pYX{*o1{I(PZ$-yRI~fQkZ)zL_N7({R2z$GU)ihvhot>l=}_%+ z;}WR$MY5;8u+W~SAmv1+EB9O&l^e6#?*ZXO#i8VOFi!jNQk_?gOM8AcS71=pA4PXS z=d{=5KB3D8m5NunaDPp4g6=7>r|(=;nxuVFZTMW9Z(oY67mTxg^&C7w3j<}QAh~;C z{~tmP*{ksz#g`{4qtgEI0)xW-JOZrKKL4*j+ztK9&ql$Cdx1Olw*~ft6*>nF$_a7@ zId_!8_J4pn4=%aP9RCU=j0*9E@{@ph9ro&6;FkY7RfsQ?kHD5fRPEDeKPtX!v_B3k z&0S@$o{Q>Vx5i}uY5h@A?PLC3rsH%sE@%7d*X@ZVgwErIl$VvCU!lTj&$Lzn)dU$7 zBzISKioSpv9-=(k4@&z%O_=!jzrN(mbMY(9%V5Zt>i?LuAJGJ2t01|%ROjR|a56XcLf4{Q4_*D4jr+D_Wuo1;{MwJ diff --git a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/PURPOSE b/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/PURPOSE deleted file mode 100644 index dbdbfc3..0000000 --- a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -Description: CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -Author: Martin Cermak -Bug summary: elfutils: Out of bound write in elf_cvt_note in libelf/note_xlate.h [rhel-7] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1679071 diff --git a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/main.fmf b/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/main.fmf deleted file mode 100644 index a8720df..0000000 --- a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -description: | - Bug summary: elfutils: Out of bound write in elf_cvt_note in libelf/note_xlate.h [rhel-7] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1679071 -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -extra-task: /tools/elfutils/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note diff --git a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/runtest.sh b/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/runtest.sh deleted file mode 100755 index 5b1c28e..0000000 --- a/tests/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note/runtest.sh +++ /dev/null @@ -1,40 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -# Description: CVE-2019-7664-Out-of-bound-write-in-elf_cvt_note -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - # Reproduced with elfutils-0.174-5.fc28.x86_64 - # This is expected to fail (1), but not to segfault (139). - rlRun "valgrind -q --error-exitcode=99 eu-elflint -d POC" 1 - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/Makefile b/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/Makefile deleted file mode 100644 index 6d2f4dc..0000000 --- a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -# Description: CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE POC2 - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Martin Cermak " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 48h" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils valgrind" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1679078" >> $(METADATA) - @echo "Releases: -RHEL4 -RHELClient5 -RHELServer5" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/POC2 b/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/POC2 deleted file mode 100644 index 0776e6191a98595bf229c769df307e28e2fb7de2..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2659 zcmdT_U1(fY5T3ia8*gkpZfmNxDSAz}pkmW)C=zJJy=ZGFp;T@3Ni=1VEW|7{yJBe} zTeqt0Y6^T`kxgN0- zY9ccvK97A64an2L*XBHY`dSeaxgQRHpr9RtZt2bL-_o1e+?(wyyw%#DYi%%agA2+F&MA0j zHpl4?zH}(QND{qxiuzk&m;x2$?NW`q?_HI5v-0%%?T@!5Tc{>D&2`(`ah8E*U_S%? z#O*NL2l_r}9&`b80u-5rV<%k??)AM7$U2$GyB^=fYT#Dj_}i}c8>k2SkQBHUNMMWi z9C5u>pp2UxJqwwYKLNbqgt;D^XC6-g8-Z2G_kf;0>U!%zXK+7f0ORG;o`u{DsvY+@ zx#O@etnM0`D_v{qp>bF(olQ(t%Ae3^oSMyCCKqEvXC|*c>{Kr;zR~@ac`AckQ zUlL{EMTGyt8_4!$^RIRvIMDr`wC?ZkM^wmT2|Dn7J01zY^CQhSNY$0_XS7mndGYxo zgV&`Paep>PjSZWK&0^-L2pf}4=4$=F2|+?EVR37g=nAR?-Gxzt^fc4 diff --git a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/PURPOSE b/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/PURPOSE deleted file mode 100644 index 7fc62cd..0000000 --- a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -Description: CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -Author: Martin Cermak -Bug summary: elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c [rhel-7] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1679078 diff --git a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/main.fmf b/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/main.fmf deleted file mode 100644 index 7883a64..0000000 --- a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -description: | - Bug summary: elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c [rhel-7] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1679078 -contact: -- Martin Cermak -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -- valgrind -duration: 48h -extra-summary: /tools/elfutils/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -extra-task: /tools/elfutils/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom diff --git a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/runtest.sh b/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/runtest.sh deleted file mode 100755 index 06e697c..0000000 --- a/tests/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom/runtest.sh +++ /dev/null @@ -1,41 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -# Description: CVE-2019-7665-heap-based-buffer-over-read-in-function-elf32_xlatetom -# Author: Martin Cermak -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2019 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -rlJournalStart - rlPhaseStartTest - # We expect 1, but not 99 ... - # Reproduced with valgrind-3.13.0-13.el7 and elfutils-0.172-2.el7 - # Verified with valgrind-3.14.0-16.el7 and elfutils-0.176-1.el7 - rlRun "valgrind -q --error-exitcode=99 eu-readelf -a POC2" 1 - rlPhaseEnd -rlJournalPrintText -rlJournalEnd diff --git a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/Makefile b/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/Makefile deleted file mode 100644 index 47c2e7b..0000000 --- a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/Makefile +++ /dev/null @@ -1,63 +0,0 @@ -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Makefile of /tools/elfutils/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow -# Description: CVE-2014-0172 elfutils: integer overflow, leading to a heap-based buffer overflow in libdw -# Author: Vaclav Kadlcik -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2014 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -export TEST=/tools/elfutils/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow -export TESTVERSION=1.0 - -BUILT_FILES= - -FILES=$(METADATA) runtest.sh Makefile PURPOSE dwz-overflow.elf - -.PHONY: all install download clean - -run: $(FILES) build - ./runtest.sh - -build: $(BUILT_FILES) - test -x runtest.sh || chmod a+x runtest.sh - -clean: - rm -f *~ $(BUILT_FILES) - - -include /usr/share/rhts/lib/rhts-make.include - -$(METADATA): Makefile - @echo "Owner: Vaclav Kadlcik " > $(METADATA) - @echo "Name: $(TEST)" >> $(METADATA) - @echo "TestVersion: $(TESTVERSION)" >> $(METADATA) - @echo "Path: $(TEST_DIR)" >> $(METADATA) - @echo "Description: CVE-2014-0172 elfutils: integer overflow, leading to a heap-based buffer overflow in libdw" >> $(METADATA) - @echo "Type: Security" >> $(METADATA) - @echo "TestTime: 5m" >> $(METADATA) - @echo "RunFor: elfutils" >> $(METADATA) - @echo "Requires: elfutils" >> $(METADATA) - @echo "Priority: Normal" >> $(METADATA) - @echo "License: GPLv2+" >> $(METADATA) - @echo "Confidential: no" >> $(METADATA) - @echo "Destructive: no" >> $(METADATA) - @echo "Bug: 1139128" >> $(METADATA) - - rhts-lint $(METADATA) diff --git a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/PURPOSE b/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/PURPOSE deleted file mode 100644 index 419b4a6..0000000 --- a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/PURPOSE +++ /dev/null @@ -1,5 +0,0 @@ -PURPOSE of /tools/elfutils/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow -Description: CVE-2014-0172 elfutils: integer overflow, leading to a heap-based buffer overflow in libdw -Author: Vaclav Kadlcik -Bug summary: elfutils: integer overflow, leading to a heap-based buffer overflow in libdw [rhel-6.6] -Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1139128 diff --git a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/dwz-overflow.elf b/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/dwz-overflow.elf deleted file mode 100644 index 98cdfb0594ce32244fc46df70e826bc5b13a6674..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 24928 zcmeHve|%KcweLPN`7x7$$q6VVfG}VZBa)vWB0pq8_%X2&0wfBpc$myglF`Y`bbf?D zy_HAsM?e&O)=R4`v{h?+uebE}UgcB05>&){TW|f<7Hey%Rhx)btu4>%ue|TtKhB() zB(Lwi&*%N|J|A{IIcu-A*IIk+wb$Nf&)NH&n^v`~wrLtu$;Pf=gn1@-IZ0d@8~OrA zC2bLNGB2xOb65c=`S|zp5`rS9;73xmf)2@N2h79&BAXyAvUzz%!5M1X7-zN37 z*}T9A_Yz<$`85NHms0DSsUYPCi#ZDDlLDn~(UzqZT zgtED;HWKbwxS%!?td4}E>Avc|MGLDJE~rVyY8rUEbr?XrYu2`NQLF%zw6}=ca3Ze8oRaIac=5l~i^<{#C!-cHE<}{8ksyO7TA(|5X>(?Jl% zvWKP}PcAd?+wngZ|A(NLurhYUvlThURGiO)e{@97{gTcLaaqpkW$f7;`g}>x<*x*N z5_7RSr&p=q@MB!5-lIA7dN{wE-S5ukXBa=hZ8To$nbF*Kl@SajLS5lxDwJruswonS zhT8lckq|SCuAW%bNT&RWlwmOA%3foGs~8+~!Yo8lAC3PcoGVN4uCH zgc6BpOy*O5MeTsvsHFN+se}=Zrb1l_e<~!2vCht5SRv5SlT@P7P+uyLrX~fbMGIll zIwPJ=1sE<#7K?|X3m33tDi}+r2tb&1#$i#alOf-SR+6l2Wse_r7@gs0n8Ai{iW#Ax zKjjBgM=~jRK#B(0nwI7jO-4gaL(QcOx3TuN=9Y~{T}^#M19gdwPhECg?dG4L3L53< z-_A7or*bcYPV<)s|LJLAC(TqV(T|h_uP7({^>2M0_;o>=QQSnIk zE}FwsQt?9cX^IF~D&wdSd8wM0dMtD~C3AX}g|6-iR8VK3Tko5TEOhIA!)u{a-75Jk zbTy`^tkpt?Bh0kPLN79@jBT~ht^Vn@&}q(9DQ=-pR7Ai&3*9=|@3he6EtE^$W}#Ex zs|52&XO`KFskwgi}`z@8|d~ z!l?^~cXE6O;na1*agHYlr!E`b%JJ(7r>+`q<#-3-)J4Nyj(?GG>YCv?j&C5Gx@6eH z@hb_Zt{B!izJhS-f?>w-#e|dVhu{Akgo*~j$>qbRfj73bZ}bg(2sgI&kJwV>zP(d? zdzaOK=ZQaIimV?Tx)MT1$sh1)>zB4PUi*}9?^hl5gHO<8K6E=uZyqeZZ7n=le|F&H z(7hm_Cwv1Zig%ZR=sUTxoE8YIWnZv->X{phXYC}+H}IOzo+|hF_O+GQ`3Bw_nk?js zcOR$HeK(fZ4Q+*e;2U`I*nX_KV9K3DprW7Dg75@&%FwG+2d6C{8m&WyPMWl3M5`d$ zkBPST+VawteJ$lvTK26huks7E>bUg7n`alsiFz&B^w|U@&>wE*R`}*H_zqPIT+%e(>0faL15=;^IfPu-&hw=bULNp0yHEdoOK7^0Bvw^7Btf!_!q? z+Jd(2M*Up>@FWjAb}jNl?@{^QOHYA76`lrqW?!eUW8k%8gQVjzs}A6opq7D?11E<5 zi~?#;^T6Q1FdB7iD`EuUwZ|&J8n0;_7-_t^dEjhgd-K3A8rxd-RU9q$pbPg^6WrKx z@tgIp`i_5QrDN);`7{3%aeUq#== zi#>DLwH0;qV=SHYcZC*{$m-^nRYh`TQdN<>SgvvSB8V8W);v`eku*$*4Ia|%)>per zuPkI%2=i~VI!WSVx zlDpHk%3XSgeU;m@FK?B*>h^q}yY7|(pLD~>bSr1 zP;WQ%&`s)GI_H6N9ysTLa~?S7fpZ=>=Yew`IOlRGn~Phu$X-;RK){I8#n#E5>-<|Sb6 z`S#@tTs^ZsWfQpiL2O8a)wAVN$WpRCb0^$R7fN{iL`nUYJ1FJV?_Bi^d@ARHJ%wJL zQ}kAeE4zJ?Pdy7)_2VZuZ;vkd@wAEKs^0e{eyTv|mumi>1GSHxTT!P|*wHKDEfU@% z;e!%BBH=R<{!+rXBs?o&L6OimMZ!u67fQHV!mB0hl#uLN)6}%sQ-z)4i#-c!7S%L( z8tUrj*EiHRc&avpf*v0pk#KtTWf$}33&N)k5@q^CFNgeD19J4dk`jM*z;oG`fnu>g zjY!l!Lnmve5!v+cr7#=6y$Nl=iG%h6y$TH z)k%+N3JN%~$@wr@;?TmdaI5n>BvYitfOI>TQ=JnuGC1zMCm)E;k(ASmRu)Xsu186q z^ZO(-Me_pL>Fl7kOx4x`+2y>8DlOI0(AMw#9HfF7+RZ?2bFL%>6^HP_*Yks}_Y*6MHw9epWqP#?Oe&&liw7b8Pd z>P=3)S5YUkiPX~tOEi)wa6AmeO>)I~MK|q6WA$TjjHX`;<7_&*jM?=iu*0eEhxdx~ zO#SU(Isy8b6{mgoo3lu7z0;Ge8t0uATspMw8<{S8p2=ILNvSoS+DAV*-Xq&E|0eyzP2ih*s{{h-&>Ia~~qYt8Vwmt>?bM!~xiwgY& zEWAkn9j0rg>I^A9t>;H=U61@zvOZ8RIvrIpM8n4i2!k*>&JD?0Q{bLj#XZq{V{Up<8 zLHScmzXZgmnSLJ_PcXd~#AlfPWeA^S`rRmdmg#+H?7uU;3|{^ZrZ0y0Pnqt4RX=0; zOpJ=>n7$jF{|Py;{G932Va@YQe*oAEOn)EXMW)jx(o0P5gxt$ap8$bhF#QOW{gUZt zq2*Uh{}i>KV*0Ouy#f}P^lPTig}Yv5`is!=8>U|k;%}MW50hSF`n_<+@0flASWYv2 z7pna|(|-*uuQPoS9PvGEc|bP|A`uR0nP=zAJBou?FPg#33fB! zr7-#yz%QY-w*p=bzS{u5g*pZRUxM~MfR}@RFQ5U_ZwLG>%-jcf9qhaVumi2W6R;Qh z_X8dSegN=~WC!~4A;4XL&jR)X)0qy|*9e@u){!YNNaL0bYsj%+=;4<*v1^5l{{dd57QUBe5 zcSG;j0B?mK?g4b5y?+n*ApCI<@Cwxbb--%0XJiBu`*A2Nth*d$6^*jWBskaaCRLIQt5p{w-)%DxAyTwC5j zwuG{iN?m;yljcuQyK6@s7@4C17P-Dc`8>y2c+YhsXPJyc9+FanM z1u6gEVU+8uA3*UWk8980ke@%sF5|LykgUV;TdL|#;?NyiV7Kc)034-I^n0?f zkZQkc73q8$xa+;IBU?h*^Qx%mMmt$%e;m~Fo6ukoC=c<)08<`Cvu*2WmbKGlHPtWz z5@)3mP_-qwivsPw<*=xXPPb@FDNAV@dIu;~MJ=6n0)Ehzeh-aI0G&=1YgbT(wgcW7 z@l=9oO;o6Z?E)~cxp3}`KsVD`Nc?*s&wLWxTjheJ6+~_Q-3XysFM|9&$~`ezHjJug zYwh_-<`}_3c@D`9%CZvDjijx8PRTZ*TF(pFvNi`Cz$;V*J4t9=KCI#u(vbtt>1-iY zq34jK7s1^y#A&AuNlLS|HpO%yle9`+!We~nIYp7Sik$x#DyYa;a!^$1mPj>_B$%Pu zhVx^dN=Y|sqn$@esLhtdbpx@n%GuJYCdeNb^7aq4c5nf-&DPf2wt=fbas|NkimZj` z>n&~iT+p3%+P0-6YGRc?l1$qnd;yxm8&7+$JbC_V(ZP#oOO=w8M+o+#uP*uoaj$LG z=vYP7rU{h)C8BpK53tQVz%G7{$Zm2}?vhly?{W11v?Y)b3?IOg(^@!6B^xpQ%;*d< z?R=7c6`J-JDQMj935E^slc%lnF7Zh2!=~i2(tW#Xx)9u zE6|t!eV%o|A^AU`?7Uw)!24sqq|Za8)iju@DF+R->YjHT@sxi(XP{23rrEuQ)jk02 zuArUR=RJc;T-V#FgeE1fgU##3kaP`bbWfs5sG0_RHQh(5`E6=m8I^xiBPp6^B$alR z^B=X5UK$F#IyUbEx`W=xji5N=y4buTh`O3JQcMo3rjcJwgHe>%?LsprHc;eA_twM5gWVtOfO zF4q+xVSXw`7Aq7~5Ef=o(PRM3ZR|#GMk&Z=OtO zky3#sXG~?qLRtTEG@%QXtJevGU{>& z`>3w-YP98L+~E9+%5X}En|FS`Fpt+U#pG~hIHrO_YQdtZ28|`($1y1+H5kd&2M>O>_K(7=R-N~Mh0F3L1WIHW3L zI%5}SJ0z>gb1kiaEth2KTV6(8G0&9c?q16MRGrUzu?7OHwuV{zgJkMV88}!-)LTi- zlLfJX6S)tG56ZrX!^wEa$5Y>Z?;fwm@McdQo_prdi?6!9g#6#9$F)7v8()kDBI#g= z)uxk)+OR-sLy^vODjZ2-ks6A}5~=Dyx+Xvs;na0FR)f_jj>2t^hms--YB1D^JmwR{ zfx(Q!*qj+zqDE8TKpx6PrpwIn1LcAUAslG$rnfsf1JP7O$|MpZgOO%a>u&o}?JmcZ z{w2#Ij@mri+j&|l&$cvAv+vmS__w#&`!;Q`_kGLm+I1+;X5aBfp5{p8*{(ow>{<(ygVUzgPjA+QeXMI#am+#t^D3tryZKrE8( ziOM$6DSTq%r_&^@BNp6lSgQ#5Be1v22*jejZ~)G+S*3-`GD^($a)U+1J?RvG^+90C zbVo9fFvJ@Gfo}e8Kp>rfeye5FGu%zoZ`49rDQ|Ej7K>-u7z~rjUVkJVVz|a7bHpD- z|8yzG$@d+E8PtE&G$Tpw6{2faMLG@gonYzpC&Fa75%(ux1>WS~9n#}Z++aotw+BBK zjUal^5?cOX5a$<@Mu6Vwkow@k6q-xUv~VU1s1~dV>{Slr6urK zI+_f3Me*Psy{V2)j`_lge62*()*bHZHsS$kEpFH$1Xm4A+$imhe z3Z!Bx9wIRVEDGzSeiCDa0+B|5IRQ`&)Zb>Ot8VEC!!i6srmO`0luQ{I{|QFTV5%=^ z_TUka2>F8;{8Ve>hSf%sv0>#k8<-J~CB^hA^~5@^hp8Z=8%+}fu{5>}gbRY`jT8c( zD250tWmLuwd`32~n4;HnEFBe~cZyVx3VJA-?#YTcJ}zYVG_^}q@(EZpi+2Gc?da8R;>1b$KS11}vgabhRi9q)<@$##uy313&t^x0<#r;9N z)ki>L^98m*fJ>Q?M1!RL$#^J$**NR2nh4<*N9|!^rV$?XcXT8|y(+}Sz>rGJljy3m z12L@Ix-d<|utX#e^4IZXFo&Zz;5H}LI2k9VLOpSuJkO%ztwXXcY_4N^{DDLaujO?r z_a_qpOi8gsP<1VhT^;~Jvw2uvpq3i}Mgvwnf}9L>(P*+nu6dWpgmCukA_f5FuUH3G zVdf|aCyiK~mK`wJAYYj?da9eI3A{l_6P6q*MkDvBw1ST=%K|SL!a5<$wMh<&+XSf= zW_O3Jw-Y!4Q30=aqaF+{ix-kTxR*#F5$h2?8S?dlxfbA&?ho9M#&U)3%oquX)=a42 zl}X%^%^{4XyFVRC$<>I(zve*VcObfrG7&q%BN!2C2w+~Ln<}D3^#r$$-_X<1L<~2; zPOJpX`)4m-n(?(G4K?dZkPCMElL!u4jZiqqyWOhBl?-En0uryV3Og;cA`ed*;F(#3 z>*_RZB4)nOpbnA>DDHR|QuC;v%{NL#1qf7YnDVaWt0YmJ?BwCEf|eJ{B_)3H(6b2c zdrv0%XlY?KnU-1>H*$NEvCb4$UReKy;~}aF@ASqoy9d(dkd^MsT0Wq&Vi;g4ge0o% zv-pRWA7--=O)2hF`gI~^S^Q{#i)dieLQ1wP+<~gQ7=MXYkg$*sBmC5jnlBEUdemJ7 zqYgK5!~g{!zmI0RA%O+4SttD-z{1wDqNm$0t?>+4)uzJHe zP9ToV55dfez_P?QI}D3kh9~PPeALfp&qObOcA&9#m93T!LGu_kL=N#%%Vo4++gO5a z;|k6&Yh16g?IvlX%Dyg1WW@SI3i~+2sIs4CF)Hj5*#?bmR9S1Y){nAokyNwBtf5t9 zzh;uIR#~;DWoNxN9a6}n8NQ=3tL)a;)ylFw)3R2Tb(*BBEso~dFG)q)Ox+v5BD3Gk zkVaRxaXdxWOQ{0JHv|tUJZfrdS6Q`#s91AV=GJOwj%!ExRqYtQnp3aBf0wCOWtG#$ zt5>;eqUp9)m7QmjMtM>_+1VqvG!XDAd%q-!fLGW<8Ag>=n+9W#3{}IOreK@O-fNOJ zs;sJpbhRB)*zYrpDyz151f#-~DG2b~eo?zQPn)`0)sD!t30}^vG1@ZDNt9 ztf~`Htg?TS`z_#7SyczPvJ?YRiqvixjP8&Ml)^FEp`_lImN^(UlnRn;&LKtl)NEl} zZk1}w&?W1!vjg5k3Mn?NZ&%q$E1yCZWcXBev6W9Dz6_truC?+h}EB=?NR6x5D#5=NpA>0r|@gjiWn$Mgd%4zb70()iEfgRgw6$QnN#FVwI$X;4hVp#F|uAY8vJ6|8oKz zu%k^2Y!vXc$mW%h1M~d0zyz<#6TA@r*bg=3+iYH7%=|uc&}r(%~-LIu_$gDpGL{!=zDFzm2P`NI;@ zhA8<-$5M2iv_L5Bd)j4rG(MM^K0H*z_oeJK7 zayo;qaCHuypAQ~f@_XCb{I60SN=aDS4~Hx zJRLi;Cgndxdk7h;y!xKpV6os>su(5At^bi6d8T^>r)+4;->82O++-?^0iNW0AL_ev zx%TGbKZ6jNs^rysBaWFuT`qqvehO@4qLQaCfKbx^H|6OpD#f0XSMN=z?*g8d?N{-s z>Q`~_7G$mUtM5d8Gz$etieF$ET+z>>3rei=hdo<4?_m!I zqv9>M|33yB=~C@KBIWOw@@kw5ZJBYS@DXIF{yIgFP|45Bp%X791s%w!yeJXZ=RE>? z1u(C=K*JlfneR3Qq1-bGUjwAm~*`UYOz?2Gd;<&MC}6*)l1g z>p$0}LjK!w9uQcjE~UpOieHTIRh8@I^j z9aTu*nN#Z=YaxA)POV?E>3Qb+ZrSvFtTVh;63^Q)BdK+Swa|{0l3E{R(;ZCR_p|9v zrtat2^dj?pw`}_8?;ldR9d~YZU(M#9XdZISrjPMmM6Rcpsry?tzixgHHJgs;QuiZE zfgN9JRPP^J$gp!VQ}>T-`gyn?Y_*bj-j25i)qHO)w6iHp&Ewg0oNw}MwUT(=jw9}B z-nACmE#Irmrsu9|M5&#B{nW~-=rcwWL9vSi>7&Z*>gJnMVrTNEG>Y!Yp$OE@W{;xN z_{n1*(6pbGa5fI3V&bUx@+v?di=XB@4PV{K?U!XzPwNCPa+$ONS<=5VhaQsj-1l6+ z0=fqO56b>h<9-jPkB*ZcNj;}?^#2>@A02Pwwd*&Wzl8ZpyvSwJ+sKa9Ug8+bKWDk< zq*3u)h=yom#I2a8N82gxZ=>V(a_E@^e;$_WO*IEMb2_g)>(V(6eJALiEKY&k2l`mw zYdymGM~|1sK!^3C(sQ7X^?lcu$Kn4gr;nb0=;gPu^iM>?$D+?3hkn^O^s7N9J9FoO zz&QMUpnFEO7Vj^CUSca|M`gb#mb;0Lm9m;Y)jICGG9-@mm*FVI<41A&`D43cXu149`(CRy}x_eIC{PSy2q+m=8bXq zcY|Jnv#|6zLTlPTj-DTkqvsh;AANuP8R%nuA2@4QO6*XLJ{1^9q>`yLzKVxkI^)Ww z4Mt1z#x`uFVxLle3)o1}NgkZ=NkXCcjIf1d;4p>Jg^hCT0tT^}n>76CKK>cI2#%=* zYZlI5h;R0e#l%0uD;{TIdlox|OgsP!rh9sD07O0x;}~{ZvGdQLf=O1xSiPa~s#V6S zwJYh<#oTh0&tk?Yot2x{HeS`-1TISnKkdkjH7)B_G`1M)Rf6g=-_Yx|erK4UX%cqPw~ez4<%fzzZJG0O zqbuc)6=}COTV8w;Ih&@=Zsbr!>&0{E^^wDb{ws0tl9R?vnk>cTOTOf}Ki7>Y8Ve&##d w;*-)j%EtIMwlFXIbm17<@yTr!rSvUsHH5Oh#4S|uqpqVh@aBnw1KCFXPZ7pYdjJ3c diff --git a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/main.fmf b/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/main.fmf deleted file mode 100644 index a2e4032..0000000 --- a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/main.fmf +++ /dev/null @@ -1,16 +0,0 @@ -summary: 'CVE-2014-0172 elfutils: integer overflow, leading to a heap-based buffer - overflow in libdw' -description: | - Bug summary: elfutils: integer overflow, leading to a heap-based buffer overflow in libdw [rhel-6.6] - Bugzilla link: https://bugzilla.redhat.com/show_bug.cgi?id=1139128 -contact: -- Vaclav Kadlcik -component: -- elfutils -test: ./runtest.sh -framework: beakerlib -recommend: -- elfutils -duration: 5m -extra-summary: /tools/elfutils/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow -extra-task: /tools/elfutils/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow diff --git a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/runtest.sh b/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/runtest.sh deleted file mode 100755 index 0f8e722..0000000 --- a/tests/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow/runtest.sh +++ /dev/null @@ -1,56 +0,0 @@ -#!/bin/bash -# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# runtest.sh of /tools/elfutils/Security/bz1139128-CVE-2014-0172-elfutils-integer-overflow -# Description: CVE-2014-0172 elfutils: integer overflow, leading to a heap-based buffer overflow in libdw -# Author: Vaclav Kadlcik -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -# -# Copyright (c) 2014 Red Hat, Inc. -# -# This program is free software: you can redistribute it and/or -# modify it under the terms of the GNU General Public License as -# published by the Free Software Foundation, either version 2 of -# the License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be -# useful, but WITHOUT ANY WARRANTY; without even the implied -# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR -# PURPOSE. See the GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see http://www.gnu.org/licenses/. -# -# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -# Include Beaker environment -. /usr/share/beakerlib/beakerlib.sh || exit 1 - -PACKAGE="elfutils" - -# Reproducer by Florian Weimer -REPRODUCING_FILE=dwz-overflow.elf - -rlJournalStart - rlPhaseStartSetup - rlAssertRpm $PACKAGE - rlRun "TmpDir=\$(mktemp -d)" 0 "Creating tmp directory" - rlRun "cp $REPRODUCING_FILE $TmpDir" 0 - rlRun "pushd $TmpDir" - rlPhaseEnd - - rlPhaseStartTest - # eu-readelf since 0.153 was vulnerable. - # The following crashed with "Segmentation fault" - # and exit value 139. - rlRun "eu-readelf -w $REPRODUCING_FILE" 0,1 'eu-readelf should not crash' - rlPhaseEnd - - rlPhaseStartCleanup - rlRun "popd" - rlRun "rm -r $TmpDir" 0 "Removing tmp directory" - rlPhaseEnd -rlJournalPrintText -rlJournalEnd