diff options
author | Jörg Frings-Fürst <debian@jff-webhosting.net> | 2022-09-10 18:42:22 +0200 |
---|---|---|
committer | Jörg Frings-Fürst <debian@jff-webhosting.net> | 2022-09-10 18:42:22 +0200 |
commit | 2a31db85c38fc8c0b2482136a619b35ef0ee2e52 (patch) | |
tree | d15d6100a59c41a870fd0aaeedcf6444573c06a9 | |
parent | d83fb6dd0cdb8d4509fda0c6e77bbeb0fcd018a8 (diff) |
Refresh patches
-rw-r--r-- | debian/patches/0100-fix_buf_overflow.patch | 4 | ||||
-rw-r--r-- | debian/patches/series | 30 |
2 files changed, 17 insertions, 17 deletions
diff --git a/debian/patches/0100-fix_buf_overflow.patch b/debian/patches/0100-fix_buf_overflow.patch index 174d205..1651487 100644 --- a/debian/patches/0100-fix_buf_overflow.patch +++ b/debian/patches/0100-fix_buf_overflow.patch @@ -11,12 +11,12 @@ Index: trunk/lib/ipmi_tsol.c =================================================================== --- trunk.orig/lib/ipmi_tsol.c +++ trunk/lib/ipmi_tsol.c -@@ -375,7 +375,7 @@ ipmi_tsol_main(struct ipmi_intf *intf, i +@@ -374,7 +374,7 @@ ipmi_tsol_main(struct ipmi_intf *intf, i char *recvip = NULL; char in_buff[IPMI_BUF_SIZE]; char out_buff[IPMI_BUF_SIZE * 8]; - char buff[IPMI_BUF_SIZE + 4]; + char buff[IPMI_BUF_SIZE * 8 + 4]; int fd_socket, result, i; - int out_buff_fill, in_buff_fill; + size_t out_buff_fill, in_buff_fill; int ip1, ip2, ip3, ip4; diff --git a/debian/patches/series b/debian/patches/series index 771ac8f..77224fb 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1,18 +1,18 @@ #0505-fix_CVE-2020-5208.patch -0120-openssl1.1.patch +#0120-openssl1.1.patch 0100-fix_buf_overflow.patch -0500-fix_CVE-2011-4339.patch -0600-manpage_longlines.patch -0110-getpass-prototype.patch -0115-typo.patch -0125-nvidia-iana.patch -0615-manpage_typo.patch -0130-Correct_lanplus_segment_violation.patch -0005-gcc10.patch +#0500-fix_CVE-2011-4339.patch +#0600-manpage_longlines.patch +#0110-getpass-prototype.patch +#0115-typo.patch +#0125-nvidia-iana.patch +#0615-manpage_typo.patch +#0130-Correct_lanplus_segment_violation.patch +#0005-gcc10.patch 0010-utf8.patch -CVE-2020-5208_1_Fix_buffer_overflow_vulnerabilities.patch -CVE-2020-5208_2-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch -CVE-2020-5208_3-session-Fix-buffer-overflow-in-ipmi_get_session_info.patch -CVE-2020-5208_4-channel-Fix-buffer-overflow.patch -CVE-2020-5208_5_lanp-Fix-buffer-overflows-in-get_lan_param_select.patch -CVE-2020-5208_6-fru-sdr-Fix-id_string-buffer-overflows.patch +#CVE-2020-5208_1_Fix_buffer_overflow_vulnerabilities.patch +#CVE-2020-5208_2-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch +#CVE-2020-5208_3-session-Fix-buffer-overflow-in-ipmi_get_session_info.patch +#CVE-2020-5208_4-channel-Fix-buffer-overflow.patch +#CVE-2020-5208_5_lanp-Fix-buffer-overflows-in-get_lan_param_select.patch +#CVE-2020-5208_6-fru-sdr-Fix-id_string-buffer-overflows.patch |