summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJörg Frings-Fürst <debian@jff-webhosting.net>2022-09-10 18:42:22 +0200
committerJörg Frings-Fürst <debian@jff-webhosting.net>2022-09-10 18:42:22 +0200
commit2a31db85c38fc8c0b2482136a619b35ef0ee2e52 (patch)
treed15d6100a59c41a870fd0aaeedcf6444573c06a9
parentd83fb6dd0cdb8d4509fda0c6e77bbeb0fcd018a8 (diff)
Refresh patches
-rw-r--r--debian/patches/0100-fix_buf_overflow.patch4
-rw-r--r--debian/patches/series30
2 files changed, 17 insertions, 17 deletions
diff --git a/debian/patches/0100-fix_buf_overflow.patch b/debian/patches/0100-fix_buf_overflow.patch
index 174d205..1651487 100644
--- a/debian/patches/0100-fix_buf_overflow.patch
+++ b/debian/patches/0100-fix_buf_overflow.patch
@@ -11,12 +11,12 @@ Index: trunk/lib/ipmi_tsol.c
===================================================================
--- trunk.orig/lib/ipmi_tsol.c
+++ trunk/lib/ipmi_tsol.c
-@@ -375,7 +375,7 @@ ipmi_tsol_main(struct ipmi_intf *intf, i
+@@ -374,7 +374,7 @@ ipmi_tsol_main(struct ipmi_intf *intf, i
char *recvip = NULL;
char in_buff[IPMI_BUF_SIZE];
char out_buff[IPMI_BUF_SIZE * 8];
- char buff[IPMI_BUF_SIZE + 4];
+ char buff[IPMI_BUF_SIZE * 8 + 4];
int fd_socket, result, i;
- int out_buff_fill, in_buff_fill;
+ size_t out_buff_fill, in_buff_fill;
int ip1, ip2, ip3, ip4;
diff --git a/debian/patches/series b/debian/patches/series
index 771ac8f..77224fb 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1,18 +1,18 @@
#0505-fix_CVE-2020-5208.patch
-0120-openssl1.1.patch
+#0120-openssl1.1.patch
0100-fix_buf_overflow.patch
-0500-fix_CVE-2011-4339.patch
-0600-manpage_longlines.patch
-0110-getpass-prototype.patch
-0115-typo.patch
-0125-nvidia-iana.patch
-0615-manpage_typo.patch
-0130-Correct_lanplus_segment_violation.patch
-0005-gcc10.patch
+#0500-fix_CVE-2011-4339.patch
+#0600-manpage_longlines.patch
+#0110-getpass-prototype.patch
+#0115-typo.patch
+#0125-nvidia-iana.patch
+#0615-manpage_typo.patch
+#0130-Correct_lanplus_segment_violation.patch
+#0005-gcc10.patch
0010-utf8.patch
-CVE-2020-5208_1_Fix_buffer_overflow_vulnerabilities.patch
-CVE-2020-5208_2-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch
-CVE-2020-5208_3-session-Fix-buffer-overflow-in-ipmi_get_session_info.patch
-CVE-2020-5208_4-channel-Fix-buffer-overflow.patch
-CVE-2020-5208_5_lanp-Fix-buffer-overflows-in-get_lan_param_select.patch
-CVE-2020-5208_6-fru-sdr-Fix-id_string-buffer-overflows.patch
+#CVE-2020-5208_1_Fix_buffer_overflow_vulnerabilities.patch
+#CVE-2020-5208_2-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch
+#CVE-2020-5208_3-session-Fix-buffer-overflow-in-ipmi_get_session_info.patch
+#CVE-2020-5208_4-channel-Fix-buffer-overflow.patch
+#CVE-2020-5208_5_lanp-Fix-buffer-overflows-in-get_lan_param_select.patch
+#CVE-2020-5208_6-fru-sdr-Fix-id_string-buffer-overflows.patch