Displaying 7 results from an estimated 7 matches for "receive_xattr".
2017 Oct 31
0
[Bug 13113] New: receive_xattr heap overflow when prepending RSYNC_PREFIX
https://bugzilla.samba.org/show_bug.cgi?id=13113
Bug ID: 13113
Summary: receive_xattr heap overflow when prepending
RSYNC_PREFIX
Product: rsync
Version: 3.1.3
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: core
Assignee: wayned at samba.o...
2017 Oct 31
2
[Bug 13112] New: receive_xattr heap overread with non null terminated name and xattr filter
https://bugzilla.samba.org/show_bug.cgi?id=13112
Bug ID: 13112
Summary: receive_xattr heap overread with non null terminated
name and xattr filter
Product: rsync
Version: 3.1.3
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: core
Assignee:...
2017 Feb 07
2
[Bug 12568] New: Integer overflow still affects xattrs.c
...ad_varint(f);
689 size_t dget_len = datum_len > MAX_FULL_DATUM ? 1 + MAX_DIGEST_LEN :
datum_len;
690 size_t extra_len = MIGHT_NEED_RPRE ? RPRE_LEN : 0;
691 if ((dget_len + extra_len < dget_len)
692 || (dget_len + extra_len + name_len < dget_len))
693 overflow_exit("receive_xattr");
694 ptr = new_array(char, dget_len + extra_len + name_len);
695 if (!ptr)
696 out_of_memory("receive_xattr");
697 name = ptr + dget_len + extra_len;
698 read_buf(f, name, name_len);
>From the code we can see that the security checks at line 691 and line 692...
2013 Jan 24
2
[Bug 9594] New: Error transferring user and non-user xattr using --fake-super under Linux
https://bugzilla.samba.org/show_bug.cgi?id=9594
Summary: Error transferring user and non-user xattr using
--fake-super under Linux
Product: rsync
Version: 3.1.0
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P5
Component: core
AssignedTo: wayned at
2016 Dec 01
3
[PATCH v2 1/2] xattrs: Skip security.evm extended attribute
...@@ -358,6 +361,9 @@ int copy_xattrs(const char *source, const char *dest)
if (user_only ? !HAS_PREFIX(name, USER_PREFIX)
: HAS_PREFIX(name, SYSTEM_PREFIX))
continue;
+
+ if (!strcmp(name, "security.evm"))
+ continue;
#endif
datum_len = 0;
@@ -828,7 +834,9 @@ void receive_xattr(int f, struct file_struct *file)
}
#ifdef HAVE_LINUX_XATTRS
/* Non-root can only save the user namespace. */
- if (am_root <= 0 && !HAS_PREFIX(name, USER_PREFIX)) {
+ if (am_root <= 0 &&
+ (!HAS_PREFIX(name, USER_PREFIX) ||
+ !strcmp(name, "security.ev...
2011 Dec 16
5
[Bug 8666] New: --debug=all9 fail
https://bugzilla.samba.org/show_bug.cgi?id=8666
Summary: --debug=all9 fail
Product: rsync
Version: 3.1.0
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: core
AssignedTo: wayned at samba.org
ReportedBy: chris at onthe.net.au
QAContact: rsync-qa at
2003 Jun 25
3
patch draft for extended attributes on linux
...file list
+ * structure in mmeory. They're later applied to the file from
+ * set_perms().
+ **/
+int xalist_receive(int f,
+ struct file_struct *file)
+{
+ uint32 v;
+ struct xa_list **ppnext;
+
+ if (verbose > 2)
+ rprintf(FINFO, "receive_xattr(%s)\n", f_name(file));
+
+ v = read_int(f);
+
+ if (v != 0x0a0aa0a0U)
+ rprintf(FERROR, "didn't get xattr placeholder\n");
+
+ /* Store the first one in here, then chain on from there */
+ file->xattrs = NULL;
+ ppnext = &f...