mirror of
https://github.com/openembedded/meta-openembedded.git
synced 2026-01-12 03:24:08 +00:00
procmail: patch CVE-2017-16844.
Take patch from Debian.
https://sources.debian.org/data/main/p/procmail/3.22-26%2Bdeb10u1/debian/patches/30
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 3d97f4c13d)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
This commit is contained in:
committed by
Armin Kuster
parent
cf633ae469
commit
0a79e257d8
@@ -0,0 +1,20 @@
|
||||
From: Santiago Vila <sanvila@debian.org>
|
||||
Subject: Fix heap-based buffer overflow in loadbuf()
|
||||
Bug-Debian: http://bugs.debian.org/876511
|
||||
X-Debian-version: 3.22-26
|
||||
|
||||
CVE: CVE-2017-16844
|
||||
Upstream-Status: Inactive-Upstream [lastrelease: 2001]
|
||||
Signed-off-by: Peter Marko <peter.marko@siemens.com>
|
||||
|
||||
--- a/src/formisc.c
|
||||
+++ b/src/formisc.c
|
||||
@@ -103,7 +103,7 @@
|
||||
}
|
||||
/* append to buf */
|
||||
void loadbuf(text,len)const char*const text;const size_t len;
|
||||
-{ if(buffilled+len>buflen) /* buf can't hold the text */
|
||||
+{ while(buffilled+len>buflen) /* buf can't hold the text */
|
||||
buf=realloc(buf,buflen+=Bsize);
|
||||
tmemmove(buf+buffilled,text,len);buffilled+=len;
|
||||
}
|
||||
@@ -14,6 +14,7 @@ SRC_URI = "http://www.ring.gr.jp/archives/net/mail/${BPN}/${BP}.tar.gz \
|
||||
file://from-debian-to-fix-man-file.patch \
|
||||
file://man-file-mailstat.1-from-debian.patch \
|
||||
file://CVE-2014-3618.patch \
|
||||
file://CVE-2017-16844.patch \
|
||||
"
|
||||
SRC_URI[md5sum] = "1678ea99b973eb77eda4ecf6acae53f1"
|
||||
SRC_URI[sha256sum] = "087c75b34dd33d8b9df5afe9e42801c9395f4bf373a784d9bc97153b0062e117"
|
||||
|
||||
Reference in New Issue
Block a user