public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] proj/kde:master commit in: kde-frameworks/ktexteditor/files/
@ 2018-09-12  5:34 Andreas Sturmlechner
  0 siblings, 0 replies; only message in thread
From: Andreas Sturmlechner @ 2018-09-12  5:34 UTC (permalink / raw
  To: gentoo-commits

commit:     7096ccdac9c9e8d38b8b5f644258a44b5227f798
Author:     Michael Mair-Keimberger <m.mairkeimberger <AT> gmail <DOT> com>
AuthorDate: Tue Sep 11 19:25:54 2018 +0000
Commit:     Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
CommitDate: Wed Sep 12 05:34:11 2018 +0000
URL:        https://gitweb.gentoo.org/proj/kde.git/commit/?id=7096ccda

kde-frameworks/ktexteditor: remove unused patch(es)

Closes: https://github.com/gentoo/kde/pull/868

 .../files/ktexteditor-5.46.0-CVE-2018-10361.patch  | 187 ---------------------
 1 file changed, 187 deletions(-)

diff --git a/kde-frameworks/ktexteditor/files/ktexteditor-5.46.0-CVE-2018-10361.patch b/kde-frameworks/ktexteditor/files/ktexteditor-5.46.0-CVE-2018-10361.patch
deleted file mode 100644
index d3b9b5d480..0000000000
--- a/kde-frameworks/ktexteditor/files/ktexteditor-5.46.0-CVE-2018-10361.patch
+++ /dev/null
@@ -1,187 +0,0 @@
-From c81af5aa1d4f6e0f8c44b2e85ca007ba2a1e4590 Mon Sep 17 00:00:00 2001
-From: Christoph Cullmann <cullmann@kde.org>
-Date: Thu, 7 Jun 2018 16:12:25 +0200
-Subject: CVE-2018-10361: privilege escalation
-
-improve handling of temporary file to avoid possible race-condition
-
-Differential Revision: https://phabricator.kde.org/D12513
----
- src/buffer/katesecuretextbuffer.cpp | 99 +++++++++++++++++--------------------
- src/buffer/katesecuretextbuffer_p.h |  4 --
- 2 files changed, 46 insertions(+), 57 deletions(-)
-
-diff --git a/src/buffer/katesecuretextbuffer.cpp b/src/buffer/katesecuretextbuffer.cpp
-index 0647bee..c014608 100644
---- a/src/buffer/katesecuretextbuffer.cpp
-+++ b/src/buffer/katesecuretextbuffer.cpp
-@@ -53,39 +53,37 @@ ActionReply SecureTextBuffer::savefile(const QVariantMap &args)
- bool SecureTextBuffer::saveFileInternal(const QString &sourceFile, const QString &targetFile,
-                                         const QByteArray &checksum, const uint ownerId, const uint groupId)
- {
--    QFileInfo targetFileInfo(targetFile);
--    if (!QDir::setCurrent(targetFileInfo.dir().path())) {
-+    /**
-+     * open source file for reading
-+     * if not possible, signal error
-+     */
-+    QFile readFile(sourceFile);
-+    if (!readFile.open(QIODevice::ReadOnly)) {
-         return false;
-     }
- 
--    // get information about target file
--    const QString targetFileName = targetFileInfo.fileName();
--    targetFileInfo.setFile(targetFileName);
--    const bool newFile = !targetFileInfo.exists();
--
--    // open source and target file
--    QFile readFile(sourceFile);
--    //TODO use QSaveFile for saving contents and automatic atomic move on commit() when QSaveFile's security problem
--    // (default temporary file permissions) is fixed
--    //
--    // We will first generate temporary filename and then use it relatively to prevent an attacker
--    // to trick us to write contents to a different file by changing underlying directory.
--    QTemporaryFile tempFile(targetFileName);
-+    /**
-+     * construct file info for target file
-+     * we need to know things like path/exists/permissions
-+     */
-+    const QFileInfo targetFileInfo(targetFile);
-+
-+    /**
-+     * create temporary file in current directory to be able to later do an atomic rename
-+     * we need to pass full path, else QTemporaryFile uses the temporary directory
-+     * if not possible, signal error, this catches e.g. a non-existing target directory, too
-+     */
-+    QTemporaryFile tempFile(targetFileInfo.absolutePath() + QStringLiteral("/secureXXXXXX"));
-     if (!tempFile.open()) {
-         return false;
-     }
--    tempFile.close();
--    QString tempFileName = QFileInfo(tempFile).fileName();
--    tempFile.setFileName(tempFileName);
--    if (!readFile.open(QIODevice::ReadOnly) || !tempFile.open()) {
--        return false;
--    }
--    const int tempFileDescriptor = tempFile.handle();
- 
--    // prepare checksum maker
-+    /**
-+     * copy contents + do checksumming
-+     * if not possible, signal error
-+     */
-     QCryptographicHash cryptographicHash(checksumAlgorithm);
--
--    // copy contents
-+    const qint64 bufferLength = 4096;
-     char buffer[bufferLength];
-     qint64 read = -1;
-     while ((read = readFile.read(buffer, bufferLength)) > 0) {
-@@ -95,30 +93,43 @@ bool SecureTextBuffer::saveFileInternal(const QString &sourceFile, const QString
-         }
-     }
- 
--    // check that copying was successful and checksum matched
--    QByteArray localChecksum = cryptographicHash.result();
--    if (read == -1 || localChecksum != checksum || !tempFile.flush()) {
-+    /**
-+     * check that copying was successful and checksum matched
-+     * we need to flush the file, as QTemporaryFile keeps the handle open
-+     * and we later do things like renaming of the file!
-+     * if not possible, signal error
-+     */
-+    if ((read == -1) || (cryptographicHash.result() != checksum) || !tempFile.flush()) {
-         return false;
-     }
- 
--    tempFile.close();
--
--    if (newFile) {
-+    /**
-+     * try to preserve the permissions
-+     */
-+    if (!targetFileInfo.exists()) {
-         // ensure new file is readable by anyone
-         tempFile.setPermissions(tempFile.permissions() | QFile::Permission::ReadGroup | QFile::Permission::ReadOther);
-     } else {
-         // ensure the same file permissions
-         tempFile.setPermissions(targetFileInfo.permissions());
-+
-         // ensure file has the same owner and group as before
--        setOwner(tempFileDescriptor, ownerId, groupId);
-+        setOwner(tempFile.handle(), ownerId, groupId);
-     }
- 
--    // rename temporary file to the target file
--    if (moveFile(tempFileName, targetFileName)) {
-+    /**
-+     * try to (atomic) rename temporary file to the target file
-+     */
-+    if (moveFile(tempFile.fileName(), targetFileInfo.filePath())) {
-         // temporary file was renamed, there is nothing to remove anymore
-         tempFile.setAutoRemove(false);
-         return true;
-     }
-+
-+    /**
-+     * we failed
-+     * QTemporaryFile will handle cleanup
-+     */
-     return false;
- }
- 
-@@ -141,28 +152,10 @@ bool SecureTextBuffer::moveFile(const QString &sourceFile, const QString &target
- {
- #if !defined(Q_OS_WIN) && !defined(Q_OS_ANDROID)
-     const int result = std::rename(QFile::encodeName(sourceFile).constData(), QFile::encodeName(targetFile).constData());
--    if (result == 0) {
--        syncToDisk(QFile(targetFile).handle());
--        return true;
--    }
--    return false;
-+    return (result == 0);
- #else
-     // use racy fallback for windows
-     QFile::remove(targetFile);
-     return QFile::rename(sourceFile, targetFile);
- #endif
- }
--
--void SecureTextBuffer::syncToDisk(const int fd)
--{
--#ifndef Q_OS_WIN
--#if HAVE_FDATASYNC
--    fdatasync(fd);
--#else
--    fsync(fd);
--#endif
--#else
--    // no-op for windows
--#endif
--}
--
-diff --git a/src/buffer/katesecuretextbuffer_p.h b/src/buffer/katesecuretextbuffer_p.h
-index a38285b..e00721c 100644
---- a/src/buffer/katesecuretextbuffer_p.h
-+++ b/src/buffer/katesecuretextbuffer_p.h
-@@ -56,8 +56,6 @@ public:
-     static const QCryptographicHash::Algorithm checksumAlgorithm = QCryptographicHash::Algorithm::Sha512;
- 
- private:
--    static const qint64 bufferLength = 4096;
--
-     /**
-      * Saves file contents using sets permissions.
-      */
-@@ -66,8 +64,6 @@ private:
- 
-     static bool moveFile(const QString &sourceFile, const QString &targetFile);
- 
--    static void syncToDisk(const int fd);
--
- public Q_SLOTS:
-     /**
-      * KAuth action to perform both prepare or move work based on given parameters.
--- 
-cgit v0.11.2


^ permalink raw reply related	[flat|nested] only message in thread

only message in thread, other threads:[~2018-09-12  5:34 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-09-12  5:34 [gentoo-commits] proj/kde:master commit in: kde-frameworks/ktexteditor/files/ Andreas Sturmlechner

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox