diff options
Diffstat (limited to 'meta/recipes-extended/tar/tar-1.17/avoid_heap_overflow.patch')
-rw-r--r-- | meta/recipes-extended/tar/tar-1.17/avoid_heap_overflow.patch | 23 |
1 files changed, 0 insertions, 23 deletions
diff --git a/meta/recipes-extended/tar/tar-1.17/avoid_heap_overflow.patch b/meta/recipes-extended/tar/tar-1.17/avoid_heap_overflow.patch deleted file mode 100644 index af5026f529..0000000000 --- a/meta/recipes-extended/tar/tar-1.17/avoid_heap_overflow.patch +++ /dev/null | |||
@@ -1,23 +0,0 @@ | |||
1 | Upstream-Status: Inappropriate [bugfix: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0624] | ||
2 | CVE: CVE-2010-0624 | ||
3 | |||
4 | This patch avoids heap overflow reported by : | ||
5 | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0624 | ||
6 | |||
7 | This is a clean patch for the GPLv2 tar recipe. | ||
8 | |||
9 | Nitin A Kamble <nitin.a.kamble@intel.com> 2011/04/25 | ||
10 | |||
11 | Index: tar-1.17/lib/rtapelib.c | ||
12 | =================================================================== | ||
13 | --- tar-1.17.orig/lib/rtapelib.c | ||
14 | +++ tar-1.17/lib/rtapelib.c | ||
15 | @@ -570,7 +570,7 @@ rmt_read__ (int handle, char *buffer, si | ||
16 | |||
17 | sprintf (command_buffer, "R%lu\n", (unsigned long) length); | ||
18 | if (do_command (handle, command_buffer) == -1 | ||
19 | - || (status = get_status (handle)) == SAFE_READ_ERROR) | ||
20 | + || ((status = get_status (handle)) == SAFE_READ_ERROR) || (status > length)) | ||
21 | return SAFE_READ_ERROR; | ||
22 | |||
23 | for (counter = 0; counter < status; counter += rlen, buffer += rlen) | ||