From 2a31db85c38fc8c0b2482136a619b35ef0ee2e52 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=B6rg=20Frings-F=C3=BCrst?= Date: Sat, 10 Sep 2022 18:42:22 +0200 Subject: Refresh patches --- debian/patches/0100-fix_buf_overflow.patch | 4 ++-- debian/patches/series | 30 +++++++++++++++--------------- 2 files changed, 17 insertions(+), 17 deletions(-) (limited to 'debian') diff --git a/debian/patches/0100-fix_buf_overflow.patch b/debian/patches/0100-fix_buf_overflow.patch index 174d205..1651487 100644 --- a/debian/patches/0100-fix_buf_overflow.patch +++ b/debian/patches/0100-fix_buf_overflow.patch @@ -11,12 +11,12 @@ Index: trunk/lib/ipmi_tsol.c =================================================================== --- trunk.orig/lib/ipmi_tsol.c +++ trunk/lib/ipmi_tsol.c -@@ -375,7 +375,7 @@ ipmi_tsol_main(struct ipmi_intf *intf, i +@@ -374,7 +374,7 @@ ipmi_tsol_main(struct ipmi_intf *intf, i char *recvip = NULL; char in_buff[IPMI_BUF_SIZE]; char out_buff[IPMI_BUF_SIZE * 8]; - char buff[IPMI_BUF_SIZE + 4]; + char buff[IPMI_BUF_SIZE * 8 + 4]; int fd_socket, result, i; - int out_buff_fill, in_buff_fill; + size_t out_buff_fill, in_buff_fill; int ip1, ip2, ip3, ip4; diff --git a/debian/patches/series b/debian/patches/series index 771ac8f..77224fb 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1,18 +1,18 @@ #0505-fix_CVE-2020-5208.patch -0120-openssl1.1.patch +#0120-openssl1.1.patch 0100-fix_buf_overflow.patch -0500-fix_CVE-2011-4339.patch -0600-manpage_longlines.patch -0110-getpass-prototype.patch -0115-typo.patch -0125-nvidia-iana.patch -0615-manpage_typo.patch -0130-Correct_lanplus_segment_violation.patch -0005-gcc10.patch +#0500-fix_CVE-2011-4339.patch +#0600-manpage_longlines.patch +#0110-getpass-prototype.patch +#0115-typo.patch +#0125-nvidia-iana.patch +#0615-manpage_typo.patch +#0130-Correct_lanplus_segment_violation.patch +#0005-gcc10.patch 0010-utf8.patch -CVE-2020-5208_1_Fix_buffer_overflow_vulnerabilities.patch -CVE-2020-5208_2-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch -CVE-2020-5208_3-session-Fix-buffer-overflow-in-ipmi_get_session_info.patch -CVE-2020-5208_4-channel-Fix-buffer-overflow.patch -CVE-2020-5208_5_lanp-Fix-buffer-overflows-in-get_lan_param_select.patch -CVE-2020-5208_6-fru-sdr-Fix-id_string-buffer-overflows.patch +#CVE-2020-5208_1_Fix_buffer_overflow_vulnerabilities.patch +#CVE-2020-5208_2-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch +#CVE-2020-5208_3-session-Fix-buffer-overflow-in-ipmi_get_session_info.patch +#CVE-2020-5208_4-channel-Fix-buffer-overflow.patch +#CVE-2020-5208_5_lanp-Fix-buffer-overflows-in-get_lan_param_select.patch +#CVE-2020-5208_6-fru-sdr-Fix-id_string-buffer-overflows.patch -- cgit v1.2.3