diff options
author | 2019-09-28 11:01:33 +0200 | |
---|---|---|
committer | 2019-09-28 22:13:33 +0200 | |
commit | 6c73ef37bd3aa2cbd25493f241cac4107522067c (patch) | |
tree | 4d4ebee7072755239b6e384e71cc1533c2c2af4f | |
parent | c26eafa96cabd597a5cce534133ee0ff996b800c (diff) | |
download | buildroot-6c73ef37bd3aa2cbd25493f241cac4107522067c.tar.gz buildroot-6c73ef37bd3aa2cbd25493f241cac4107522067c.tar.bz2 |
package/exim: add upstream security fix
Fixes CVE-2019-16928:
https://lists.exim.org/lurker/message/20190928.003428.2b4c81a7.en.html
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
-rw-r--r-- | package/exim/0006-Fix-buffer-overflow-in-string_vformat.patch | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/package/exim/0006-Fix-buffer-overflow-in-string_vformat.patch b/package/exim/0006-Fix-buffer-overflow-in-string_vformat.patch new file mode 100644 index 0000000000..5b022e2fc3 --- /dev/null +++ b/package/exim/0006-Fix-buffer-overflow-in-string_vformat.patch @@ -0,0 +1,44 @@ +From 478effbfd9c3cc5a627fc671d4bf94d13670d65f Mon Sep 17 00:00:00 2001 +From: Jeremy Harris <jgh146exb@wizmail.org> +Date: Fri, 27 Sep 2019 12:21:49 +0100 +Subject: [PATCH] Fix buffer overflow in string_vformat. Bug 2449 + +Fixes CVE-2019-16928: +https://lists.exim.org/lurker/message/20190928.003428.2b4c81a7.en.html + +Downloaded from upstream commit +https://git.exim.org/exim.git/patch/478effbfd9c3cc5a627fc671d4bf94d13670d65f + +[adjusted patch of string.c and removed patches for test/] +Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> +--- + src/string.c | 4 ++-- + scripts/0000-Basic/0214 | 11 +++++++++++ + stdout/0214 | 7 +++++++ + 3 files changed, 20 insertions(+), 2 deletions(-) + +diff --git a/src/src/string.c b/src/src/string.c +index c6549bf..3445f8a 100644 +--- a/src/string.c ++++ b/src/string.c +@@ -1132,7 +1132,7 @@ store_reset(g->s + (g->size = g->ptr + 1)); + Arguments: + g the growable-string + p current end of data +- count amount to grow by ++ count amount to grow by, offset from p + */ + + static void +@@ -1590,7 +1590,7 @@ while (*fp) + } + else if (g->ptr >= lim - width) + { +- gstring_grow(g, g->ptr, width - (lim - g->ptr)); ++ gstring_grow(g, g->ptr, width); + lim = g->size - 1; + gp = CS g->s + g->ptr; + } +-- +1.9.1 + |