diff options
author | Michael Mair-Keimberger <m.mairkeimberger@gmail.com> | 2019-11-19 10:20:00 +0100 |
---|---|---|
committer | Aaron Bauman <bman@gentoo.org> | 2019-11-23 19:40:57 -0500 |
commit | 365f9a0b3c92720e181bd400eb32081eaabecdb5 (patch) | |
tree | fc9f0ecd796d20d9c08440987961c97f17150c91 /app-misc/dtach | |
parent | sci-libs/hdf: remove unused patches (diff) | |
download | gentoo-365f9a0b3c92720e181bd400eb32081eaabecdb5.tar.gz gentoo-365f9a0b3c92720e181bd400eb32081eaabecdb5.tar.bz2 gentoo-365f9a0b3c92720e181bd400eb32081eaabecdb5.zip |
app-misc/dtach: remove unused patch(es)
Signed-off-by: Michael Mair-Keimberger <m.mairkeimberger@gmail.com>
Closes: https://github.com/gentoo/gentoo/pull/13701
Signed-off-by: Aaron Bauman <bman@gentoo.org>
Diffstat (limited to 'app-misc/dtach')
-rw-r--r-- | app-misc/dtach/files/dtach-0.8-CVE-2012-3368.patch | 35 |
1 files changed, 0 insertions, 35 deletions
diff --git a/app-misc/dtach/files/dtach-0.8-CVE-2012-3368.patch b/app-misc/dtach/files/dtach-0.8-CVE-2012-3368.patch deleted file mode 100644 index 82d5f0e1e159..000000000000 --- a/app-misc/dtach/files/dtach-0.8-CVE-2012-3368.patch +++ /dev/null @@ -1,35 +0,0 @@ -Fix error handling for read from stdin in attach.c - -attach.c did not correctly handle a read from stdin when read returned -an error. The code assigned the return value of read to pkt.len (an -unsigned char) before checking the value. This prevented the error check -from working correctly, since an unsigned integer can never be < 0. - -A packet with an invalid length was then sent to the master, which then -sent 255 bytes of garbage to the program. - -Fix the bug in attach.c and the unchecked packet length bug in master.c. - -Report and initial patch by Enrico Scholz. - ---- attach.c 2012/07/01 21:26:10 1.12 -+++ attach.c 2012/07/01 21:44:34 1.13 -@@ -237,12 +237,16 @@ - /* stdin activity */ - if (n > 0 && FD_ISSET(0, &readfds)) - { -+ ssize_t len; -+ - pkt.type = MSG_PUSH; - memset(pkt.u.buf, 0, sizeof(pkt.u.buf)); -- pkt.len = read(0, pkt.u.buf, sizeof(pkt.u.buf)); -+ len = read(0, pkt.u.buf, sizeof(pkt.u.buf)); - -- if (pkt.len <= 0) -+ if (len <= 0) - exit(1); -+ -+ pkt.len = len; - process_kbd(s, &pkt); - n--; - } |