aboutsummaryrefslogtreecommitdiffstats
path: root/editors
diff options
context:
space:
mode:
authormaho <maho@FreeBSD.org>2004-09-15 06:20:51 +0800
committermaho <maho@FreeBSD.org>2004-09-15 06:20:51 +0800
commit3a63988ad71ec9856151a8025baa6d57496a3d77 (patch)
treeb37e28bfc6476f47aacbf1a742da17cd00513176 /editors
parent6ca04cce34edfd7a8a4ef417ee6f96256bdad012 (diff)
downloadfreebsd-ports-gnome-3a63988ad71ec9856151a8025baa6d57496a3d77.tar.gz
freebsd-ports-gnome-3a63988ad71ec9856151a8025baa6d57496a3d77.tar.zst
freebsd-ports-gnome-3a63988ad71ec9856151a8025baa6d57496a3d77.zip
[1] add security-temp-dir patch to protect a person's privacy.
(Insecure permissions on temporary files at runtime) http://www.openoffice.org/issues/show_bug.cgi?id=33357 http://vuxml.freebsd.org/c62dc69f-05c8-11d9-b45d-000c41e2cdad.html [2] disable Mozilla connectivity by default at the moment. there are security vulnerabilities in mozilla 1.0.2, can also affect for this port. http://www.FreeBSD.org/ports/portaudit/730db824-e216-11d8-9b0a-000347a4fa7d.html http://www.FreeBSD.org/ports/portaudit/f9e3e60b-e650-11d8-9b0a-000347a4fa7d.html http://www.FreeBSD.org/ports/portaudit/abe47a5a-e23c-11d8-9b0a-000347a4fa7d.html Reported by: nectar [1], many persons via portsaudit [2] Approved by: portmgr (marcus)
Diffstat (limited to 'editors')
-rw-r--r--editors/openoffice-1.1/Makefile2
-rw-r--r--editors/openoffice-1.1/files/patch-security-tmp-dir207
-rw-r--r--editors/openoffice.org-1.1/Makefile2
-rw-r--r--editors/openoffice.org-1.1/files/patch-security-tmp-dir207
4 files changed, 418 insertions, 0 deletions
diff --git a/editors/openoffice-1.1/Makefile b/editors/openoffice-1.1/Makefile
index eb2cf02e2c1e..45130ed0fdb6 100644
--- a/editors/openoffice-1.1/Makefile
+++ b/editors/openoffice-1.1/Makefile
@@ -36,6 +36,8 @@ USE_PERL5= yes
USE_BISON= yes
USE_GMAKE= yes
USE_REINPLACE= yes
+#mozilla 1.0 seems to have security vulnerability
+WITHOUT_MOZILLA= yes
.if !defined(WITHOUT_JAVA)
USE_JAVA= 1.4+
diff --git a/editors/openoffice-1.1/files/patch-security-tmp-dir b/editors/openoffice-1.1/files/patch-security-tmp-dir
new file mode 100644
index 000000000000..b1ee4020a451
--- /dev/null
+++ b/editors/openoffice-1.1/files/patch-security-tmp-dir
@@ -0,0 +1,207 @@
+http://www.openoffice.org/issues/show_bug.cgi?id=33357
+Insecure permissions on temporary files at runtime
+*** SECURTY FIX ***
+
+--- ../sal/util/sal.map 9 Jan 2004 18:31:53 -0000 1.42.70.1
++++ ../sal/util/sal.map 30 Aug 2004 13:59:22 -0000
+@@ -402,6 +403,7 @@
+ osl_writeFile;
+ osl_closeFile;
+ osl_createDirectory;
++ osl_createDirectoryWithMode;
+ osl_removeDirectory;
+ osl_removeFile;
+ osl_copyFile;
+Index: ../sal/inc/osl/file.h
+===================================================================
+RCS file: /cvs/porting/sal/inc/osl/file.h,v
+retrieving revision 1.27.48.1
+diff -u -r1.27.48.1 file.h
+--- ../sal/inc/osl/file.h 9 Jan 2004 18:31:45 -0000 1.27.48.1
++++ ../sal/inc/osl/file.h 30 Aug 2004 13:59:25 -0000
+@@ -1036,6 +1036,8 @@
+
+ oslFileError SAL_CALL osl_createDirectory( rtl_uString* pustrDirectoryURL );
+
++oslFileError SAL_CALL osl_createDirectoryWithMode( rtl_uString* pustrDirectoryURL, sal_uInt64 uAttributes );
++
+
+ /** Remove an empty directory.
+
+Index: ../sal/inc/osl/file.hxx
+===================================================================
+RCS file: /cvs/porting/sal/inc/osl/file.hxx,v
+retrieving revision 1.30.48.1
+diff -u -r1.30.48.1 file.hxx
+--- ../sal/inc/osl/file.hxx 9 Jan 2004 18:31:45 -0000 1.30.48.1
++++ ../sal/inc/osl/file.hxx 30 Aug 2004 13:59:32 -0000
+@@ -1819,6 +1819,12 @@
+ inline static RC create( const ::rtl::OUString& ustrDirectoryURL )
+ {
+ return (RC) osl_createDirectory( ustrDirectoryURL.pData );
++ }
++
++ inline static RC createWithMode( const ::rtl::OUString& ustrDirectoryURL,
++ sal_uInt64 uAttributes )
++ {
++ return (RC) osl_createDirectoryWithMode( ustrDirectoryURL.pData, uAttributes );
+ }
+
+ /** Remove an empty directory.
+Index: ../sal/osl/unx/file.c
+===================================================================
+RCS file: /cvs/porting/sal/osl/unx/Attic/file.c,v
+retrieving revision 1.72.28.1
+diff -u -r1.72.28.1 file.c
+--- ../sal/osl/unx/file.c 9 Jan 2004 18:31:46 -0000 1.72.28.1
++++ ../sal/osl/unx/file.c 30 Aug 2004 13:59:41 -0000
+@@ -246,7 +246,7 @@
+
+ static oslFileError osl_psz_getVolumeInformation(const sal_Char* , oslVolumeInfo* pInfo, sal_uInt32 uFieldMask);
+ static oslFileError osl_psz_removeFile(const sal_Char* pszPath);
+-static oslFileError osl_psz_createDirectory(const sal_Char* pszPath);
++static oslFileError osl_psz_createDirectory(const sal_Char* pszPath, sal_uInt64 uAttributes);
+ static oslFileError osl_psz_removeDirectory(const sal_Char* pszPath);
+ static oslFileError osl_psz_copyFile(const sal_Char* pszPath, const sal_Char* pszDestPath);
+ static oslFileError osl_psz_moveFile(const sal_Char* pszPath, const sal_Char* pszDestPath);
+@@ -853,7 +853,7 @@
+ /* osl_createDirectory */
+ /****************************************************************************/
+
+-oslFileError osl_createDirectory( rtl_uString* ustrDirectoryURL )
++oslFileError osl_createDirectoryWithMode( rtl_uString* ustrDirectoryURL, sal_uInt64 uAttributes )
+ {
+ char path[PATH_MAX];
+ oslFileError eRet;
+@@ -865,7 +865,13 @@
+ if( eRet != osl_File_E_None )
+ return eRet;
+
+- return osl_psz_createDirectory( path );
++ return osl_psz_createDirectory( path, uAttributes );
++}
++
++/* Broken, insecure, deprecated version */
++oslFileError osl_createDirectory( rtl_uString* ustrDirectoryURL )
++{
++ return osl_createDirectoryWithMode( ustrDirectoryURL, 0xffffffff );
+ }
+
+ /****************************************************************************/
+@@ -1383,12 +1389,9 @@
+ * osl_psz_setFileAttributes
+ ************************************/
+
+-static oslFileError osl_psz_setFileAttributes( const sal_Char* pszFilePath, sal_uInt64 uAttributes )
++static int osl_getNativeMode( sal_uInt64 uAttributes )
+ {
+- oslFileError osl_error = osl_File_E_None;
+- mode_t nNewMode = 0;
+-
+- OSL_ENSURE(!(osl_File_Attribute_Hidden & uAttributes), "osl_File_Attribute_Hidden doesn't work under Unix");
++ mode_t nNewMode = 0;
+
+ if (uAttributes & osl_File_Attribute_OwnRead)
+ nNewMode |= S_IRUSR;
+@@ -1417,7 +1420,17 @@
+ if (uAttributes & osl_File_Attribute_OthExe)
+ nNewMode|=S_IXOTH;
+
+- if (chmod(pszFilePath, nNewMode) < 0)
++
++ return nNewMode;
++}
++
++static oslFileError osl_psz_setFileAttributes( const sal_Char* pszFilePath, sal_uInt64 uAttributes )
++{
++ oslFileError osl_error = osl_File_E_None;
++
++ OSL_ENSURE(!(osl_File_Attribute_Hidden & uAttributes), "osl_File_Attribute_Hidden doesn't work under Unix");
++
++ if (chmod(pszFilePath, osl_getNativeMode( uAttributes )) < 0)
+ osl_error = oslTranslateFileError(OSL_FET_ERROR, errno);
+
+ return osl_error;
+@@ -1543,13 +1558,12 @@
+ * osl_psz_createDirectory
+ ****************************************/
+
+-static oslFileError osl_psz_createDirectory( const sal_Char* pszPath )
++static oslFileError osl_psz_createDirectory( const sal_Char* pszPath, sal_uInt64 uAttributes )
+ {
+ int nRet=0;
+- int mode = S_IRWXU | S_IRWXG | S_IRWXO;
+
+- nRet = mkdir(pszPath,mode);
++ nRet = mkdir(pszPath, osl_getNativeMode( uAttributes ));
+
+ if ( nRet < 0 )
+ {
+ nRet=errno;
+Index: unotools/source/ucbhelper/tempfile.cxx
+===================================================================
+RCS file: /cvs/util/unotools/source/ucbhelper/tempfile.cxx,v
+retrieving revision 1.14
+diff -u -r1.14 tempfile.cxx
+--- ../unotools/source/ucbhelper/tempfile.cxx 9 Sep 2002 10:25:47 -0000 1.14
++++ ../unotools/source/ucbhelper/tempfile.cxx 30 Aug 2004 14:00:58 -0000
+@@ -125,7 +125,10 @@
+ return sal_True;
+
+ // try to create the directory
+- nError = osl::Directory::create( aPath );
++ nError = osl::Directory::createWithMode( aPath,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ sal_Bool bSuccess = ( nError == osl::File::E_None || nError == osl::FileBase::E_EXIST );
+ if( !bSuccess )
+ {
+@@ -139,7 +142,10 @@
+ if ( bSuccess )
+ {
+ // Parent directory exists, retry creation of directory
+- nError = osl::Directory::create( aPath );
++ nError = osl::Directory::createWithMode( aPath,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ bSuccess =( nError == osl::File::E_None || nError == osl::FileBase::E_EXIST );
+ }
+ }
+@@ -222,7 +228,10 @@
+
+ if ( bDir )
+ {
+- FileBase::RC err = Directory::create( aTmp );
++ FileBase::RC err = Directory::createWithMode( aTmp,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ if ( err == FileBase::E_None )
+ {
+ // !bKeep: only for creating a name, not a file or directory
+@@ -305,7 +314,10 @@
+ aTmp += String::CreateFromAscii( ".tmp" );
+ if ( bDirectory )
+ {
+- FileBase::RC err = Directory::create( aTmp );
++ FileBase::RC err = osl::Directory::createWithMode( aTmp,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ if ( err == FileBase::E_None )
+ {
+ pImp->aName = aTmp;
+@@ -401,7 +413,10 @@
+
+ // try to create the directory
+ sal_Bool bRet = sal_False;
+- osl::FileBase::RC err = osl::Directory::create( aUnqPath );
++ osl::FileBase::RC err = osl::Directory::createWithMode( aUnqPath,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ if ( err != FileBase::E_None && err != FileBase::E_EXIST )
+ // perhaps parent(s) don't exist
+ bRet = ensuredir( aUnqPath );
diff --git a/editors/openoffice.org-1.1/Makefile b/editors/openoffice.org-1.1/Makefile
index eb2cf02e2c1e..45130ed0fdb6 100644
--- a/editors/openoffice.org-1.1/Makefile
+++ b/editors/openoffice.org-1.1/Makefile
@@ -36,6 +36,8 @@ USE_PERL5= yes
USE_BISON= yes
USE_GMAKE= yes
USE_REINPLACE= yes
+#mozilla 1.0 seems to have security vulnerability
+WITHOUT_MOZILLA= yes
.if !defined(WITHOUT_JAVA)
USE_JAVA= 1.4+
diff --git a/editors/openoffice.org-1.1/files/patch-security-tmp-dir b/editors/openoffice.org-1.1/files/patch-security-tmp-dir
new file mode 100644
index 000000000000..b1ee4020a451
--- /dev/null
+++ b/editors/openoffice.org-1.1/files/patch-security-tmp-dir
@@ -0,0 +1,207 @@
+http://www.openoffice.org/issues/show_bug.cgi?id=33357
+Insecure permissions on temporary files at runtime
+*** SECURTY FIX ***
+
+--- ../sal/util/sal.map 9 Jan 2004 18:31:53 -0000 1.42.70.1
++++ ../sal/util/sal.map 30 Aug 2004 13:59:22 -0000
+@@ -402,6 +403,7 @@
+ osl_writeFile;
+ osl_closeFile;
+ osl_createDirectory;
++ osl_createDirectoryWithMode;
+ osl_removeDirectory;
+ osl_removeFile;
+ osl_copyFile;
+Index: ../sal/inc/osl/file.h
+===================================================================
+RCS file: /cvs/porting/sal/inc/osl/file.h,v
+retrieving revision 1.27.48.1
+diff -u -r1.27.48.1 file.h
+--- ../sal/inc/osl/file.h 9 Jan 2004 18:31:45 -0000 1.27.48.1
++++ ../sal/inc/osl/file.h 30 Aug 2004 13:59:25 -0000
+@@ -1036,6 +1036,8 @@
+
+ oslFileError SAL_CALL osl_createDirectory( rtl_uString* pustrDirectoryURL );
+
++oslFileError SAL_CALL osl_createDirectoryWithMode( rtl_uString* pustrDirectoryURL, sal_uInt64 uAttributes );
++
+
+ /** Remove an empty directory.
+
+Index: ../sal/inc/osl/file.hxx
+===================================================================
+RCS file: /cvs/porting/sal/inc/osl/file.hxx,v
+retrieving revision 1.30.48.1
+diff -u -r1.30.48.1 file.hxx
+--- ../sal/inc/osl/file.hxx 9 Jan 2004 18:31:45 -0000 1.30.48.1
++++ ../sal/inc/osl/file.hxx 30 Aug 2004 13:59:32 -0000
+@@ -1819,6 +1819,12 @@
+ inline static RC create( const ::rtl::OUString& ustrDirectoryURL )
+ {
+ return (RC) osl_createDirectory( ustrDirectoryURL.pData );
++ }
++
++ inline static RC createWithMode( const ::rtl::OUString& ustrDirectoryURL,
++ sal_uInt64 uAttributes )
++ {
++ return (RC) osl_createDirectoryWithMode( ustrDirectoryURL.pData, uAttributes );
+ }
+
+ /** Remove an empty directory.
+Index: ../sal/osl/unx/file.c
+===================================================================
+RCS file: /cvs/porting/sal/osl/unx/Attic/file.c,v
+retrieving revision 1.72.28.1
+diff -u -r1.72.28.1 file.c
+--- ../sal/osl/unx/file.c 9 Jan 2004 18:31:46 -0000 1.72.28.1
++++ ../sal/osl/unx/file.c 30 Aug 2004 13:59:41 -0000
+@@ -246,7 +246,7 @@
+
+ static oslFileError osl_psz_getVolumeInformation(const sal_Char* , oslVolumeInfo* pInfo, sal_uInt32 uFieldMask);
+ static oslFileError osl_psz_removeFile(const sal_Char* pszPath);
+-static oslFileError osl_psz_createDirectory(const sal_Char* pszPath);
++static oslFileError osl_psz_createDirectory(const sal_Char* pszPath, sal_uInt64 uAttributes);
+ static oslFileError osl_psz_removeDirectory(const sal_Char* pszPath);
+ static oslFileError osl_psz_copyFile(const sal_Char* pszPath, const sal_Char* pszDestPath);
+ static oslFileError osl_psz_moveFile(const sal_Char* pszPath, const sal_Char* pszDestPath);
+@@ -853,7 +853,7 @@
+ /* osl_createDirectory */
+ /****************************************************************************/
+
+-oslFileError osl_createDirectory( rtl_uString* ustrDirectoryURL )
++oslFileError osl_createDirectoryWithMode( rtl_uString* ustrDirectoryURL, sal_uInt64 uAttributes )
+ {
+ char path[PATH_MAX];
+ oslFileError eRet;
+@@ -865,7 +865,13 @@
+ if( eRet != osl_File_E_None )
+ return eRet;
+
+- return osl_psz_createDirectory( path );
++ return osl_psz_createDirectory( path, uAttributes );
++}
++
++/* Broken, insecure, deprecated version */
++oslFileError osl_createDirectory( rtl_uString* ustrDirectoryURL )
++{
++ return osl_createDirectoryWithMode( ustrDirectoryURL, 0xffffffff );
+ }
+
+ /****************************************************************************/
+@@ -1383,12 +1389,9 @@
+ * osl_psz_setFileAttributes
+ ************************************/
+
+-static oslFileError osl_psz_setFileAttributes( const sal_Char* pszFilePath, sal_uInt64 uAttributes )
++static int osl_getNativeMode( sal_uInt64 uAttributes )
+ {
+- oslFileError osl_error = osl_File_E_None;
+- mode_t nNewMode = 0;
+-
+- OSL_ENSURE(!(osl_File_Attribute_Hidden & uAttributes), "osl_File_Attribute_Hidden doesn't work under Unix");
++ mode_t nNewMode = 0;
+
+ if (uAttributes & osl_File_Attribute_OwnRead)
+ nNewMode |= S_IRUSR;
+@@ -1417,7 +1420,17 @@
+ if (uAttributes & osl_File_Attribute_OthExe)
+ nNewMode|=S_IXOTH;
+
+- if (chmod(pszFilePath, nNewMode) < 0)
++
++ return nNewMode;
++}
++
++static oslFileError osl_psz_setFileAttributes( const sal_Char* pszFilePath, sal_uInt64 uAttributes )
++{
++ oslFileError osl_error = osl_File_E_None;
++
++ OSL_ENSURE(!(osl_File_Attribute_Hidden & uAttributes), "osl_File_Attribute_Hidden doesn't work under Unix");
++
++ if (chmod(pszFilePath, osl_getNativeMode( uAttributes )) < 0)
+ osl_error = oslTranslateFileError(OSL_FET_ERROR, errno);
+
+ return osl_error;
+@@ -1543,13 +1558,12 @@
+ * osl_psz_createDirectory
+ ****************************************/
+
+-static oslFileError osl_psz_createDirectory( const sal_Char* pszPath )
++static oslFileError osl_psz_createDirectory( const sal_Char* pszPath, sal_uInt64 uAttributes )
+ {
+ int nRet=0;
+- int mode = S_IRWXU | S_IRWXG | S_IRWXO;
+
+- nRet = mkdir(pszPath,mode);
++ nRet = mkdir(pszPath, osl_getNativeMode( uAttributes ));
+
+ if ( nRet < 0 )
+ {
+ nRet=errno;
+Index: unotools/source/ucbhelper/tempfile.cxx
+===================================================================
+RCS file: /cvs/util/unotools/source/ucbhelper/tempfile.cxx,v
+retrieving revision 1.14
+diff -u -r1.14 tempfile.cxx
+--- ../unotools/source/ucbhelper/tempfile.cxx 9 Sep 2002 10:25:47 -0000 1.14
++++ ../unotools/source/ucbhelper/tempfile.cxx 30 Aug 2004 14:00:58 -0000
+@@ -125,7 +125,10 @@
+ return sal_True;
+
+ // try to create the directory
+- nError = osl::Directory::create( aPath );
++ nError = osl::Directory::createWithMode( aPath,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ sal_Bool bSuccess = ( nError == osl::File::E_None || nError == osl::FileBase::E_EXIST );
+ if( !bSuccess )
+ {
+@@ -139,7 +142,10 @@
+ if ( bSuccess )
+ {
+ // Parent directory exists, retry creation of directory
+- nError = osl::Directory::create( aPath );
++ nError = osl::Directory::createWithMode( aPath,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ bSuccess =( nError == osl::File::E_None || nError == osl::FileBase::E_EXIST );
+ }
+ }
+@@ -222,7 +228,10 @@
+
+ if ( bDir )
+ {
+- FileBase::RC err = Directory::create( aTmp );
++ FileBase::RC err = Directory::createWithMode( aTmp,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ if ( err == FileBase::E_None )
+ {
+ // !bKeep: only for creating a name, not a file or directory
+@@ -305,7 +314,10 @@
+ aTmp += String::CreateFromAscii( ".tmp" );
+ if ( bDirectory )
+ {
+- FileBase::RC err = Directory::create( aTmp );
++ FileBase::RC err = osl::Directory::createWithMode( aTmp,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ if ( err == FileBase::E_None )
+ {
+ pImp->aName = aTmp;
+@@ -401,7 +413,10 @@
+
+ // try to create the directory
+ sal_Bool bRet = sal_False;
+- osl::FileBase::RC err = osl::Directory::create( aUnqPath );
++ osl::FileBase::RC err = osl::Directory::createWithMode( aUnqPath,
++ osl_File_Attribute_OwnWrite |
++ osl_File_Attribute_OwnRead |
++ osl_File_Attribute_OwnExe );
+ if ( err != FileBase::E_None && err != FileBase::E_EXIST )
+ // perhaps parent(s) don't exist
+ bRet = ensuredir( aUnqPath );