summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichael Mair-Keimberger <m.mairkeimberger@gmail.com>2019-11-19 10:20:00 +0100
committerAaron Bauman <bman@gentoo.org>2019-11-23 19:40:57 -0500
commit365f9a0b3c92720e181bd400eb32081eaabecdb5 (patch)
treefc9f0ecd796d20d9c08440987961c97f17150c91 /app-misc
parentsci-libs/hdf: remove unused patches (diff)
downloadgentoo-365f9a0b3c92720e181bd400eb32081eaabecdb5.tar.gz
gentoo-365f9a0b3c92720e181bd400eb32081eaabecdb5.tar.bz2
gentoo-365f9a0b3c92720e181bd400eb32081eaabecdb5.zip
app-misc/dtach: remove unused patch(es)
Signed-off-by: Michael Mair-Keimberger <m.mairkeimberger@gmail.com> Closes: https://github.com/gentoo/gentoo/pull/13701 Signed-off-by: Aaron Bauman <bman@gentoo.org>
Diffstat (limited to 'app-misc')
-rw-r--r--app-misc/dtach/files/dtach-0.8-CVE-2012-3368.patch35
1 files changed, 0 insertions, 35 deletions
diff --git a/app-misc/dtach/files/dtach-0.8-CVE-2012-3368.patch b/app-misc/dtach/files/dtach-0.8-CVE-2012-3368.patch
deleted file mode 100644
index 82d5f0e1e159..000000000000
--- a/app-misc/dtach/files/dtach-0.8-CVE-2012-3368.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-Fix error handling for read from stdin in attach.c
-
-attach.c did not correctly handle a read from stdin when read returned
-an error. The code assigned the return value of read to pkt.len (an
-unsigned char) before checking the value. This prevented the error check
-from working correctly, since an unsigned integer can never be < 0.
-
-A packet with an invalid length was then sent to the master, which then
-sent 255 bytes of garbage to the program.
-
-Fix the bug in attach.c and the unchecked packet length bug in master.c.
-
-Report and initial patch by Enrico Scholz.
-
---- attach.c 2012/07/01 21:26:10 1.12
-+++ attach.c 2012/07/01 21:44:34 1.13
-@@ -237,12 +237,16 @@
- /* stdin activity */
- if (n > 0 && FD_ISSET(0, &readfds))
- {
-+ ssize_t len;
-+
- pkt.type = MSG_PUSH;
- memset(pkt.u.buf, 0, sizeof(pkt.u.buf));
-- pkt.len = read(0, pkt.u.buf, sizeof(pkt.u.buf));
-+ len = read(0, pkt.u.buf, sizeof(pkt.u.buf));
-
-- if (pkt.len <= 0)
-+ if (len <= 0)
- exit(1);
-+
-+ pkt.len = len;
- process_kbd(s, &pkt);
- n--;
- }