summaryrefslogtreecommitdiff
path: root/tests/zgrep-abuse
blob: 376175da5208055b2ea65355503467c67ad246ef (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
#!/bin/sh
# Show how zgrep applied to a crafted file name may overwrite
# a selected file with chosen content.  Fixed in gzip-1.12.

# Copyright (C) 2022-2023 Free Software Foundation, Inc.

# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.

# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.

# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <https://www.gnu.org/licenses/>.
# limit so don't run it by default.

. "${srcdir=.}/init.sh"; path_prepend_ ..

: > z || framework_failure_
echo test |gzip > 'z|
p
1s|.*|chosen-content|
1w hacked
etouch .\x2fhacked2
d
#
#' || framework_failure_

fail=0

zgrep test z* > /dev/null

# Before the fix, each of these would be created.
test -f hacked && fail=1
test -f hacked2 && fail=1

Exit $fail