diff options
author | Mihai Moldovan <ionic@ionic.de> | 2017-08-03 09:41:21 +0200 |
---|---|---|
committer | Mihai Moldovan <ionic@ionic.de> | 2017-08-03 09:41:21 +0200 |
commit | 6ae091cc27f90bd431e4d9564c760fa209f8efb8 (patch) | |
tree | 253588fb5860a00d39e957085a08a0dfcd736927 /debian/patches/1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch | |
parent | a4fb30f8d0dc188821ac61d64d113a6ae6156b95 (diff) | |
download | nx-libs-6ae091cc27f90bd431e4d9564c760fa209f8efb8.tar.gz nx-libs-6ae091cc27f90bd431e4d9564c760fa209f8efb8.tar.bz2 nx-libs-6ae091cc27f90bd431e4d9564c760fa209f8efb8.zip |
debian/patches: refresh all patches.
Removes some fuzziness and adds the -p diff option to show the C
function name in hunk headers.
Diffstat (limited to 'debian/patches/1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch')
-rw-r--r-- | debian/patches/1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch | 7 |
1 files changed, 1 insertions, 6 deletions
diff --git a/debian/patches/1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch b/debian/patches/1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch index 63ba2b9ff..d6d460b9a 100644 --- a/debian/patches/1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch +++ b/debian/patches/1013-CVE-2014-0211-integer-overflow-in-fs_alloc_glyp.full.patch @@ -11,11 +11,9 @@ which can cause memory corruption. nx-X11/lib/font/fc/fsconvert.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) -diff --git a/nx-X11/lib/font/fc/fsconvert.c b/nx-X11/lib/font/fc/fsconvert.c -index d41e0b8..afa2c32 100644 --- a/nx-X11/lib/font/fc/fsconvert.c +++ b/nx-X11/lib/font/fc/fsconvert.c -@@ -762,7 +762,12 @@ fs_alloc_glyphs (FontPtr pFont, int size) +@@ -762,7 +762,12 @@ fs_alloc_glyphs (FontPtr pFont, int size FSGlyphPtr glyphs; FSFontPtr fsfont = (FSFontPtr) pFont->fontPrivate; @@ -29,6 +27,3 @@ index d41e0b8..afa2c32 100644 glyphs->next = fsfont->glyphs; fsfont->glyphs = glyphs; return (pointer) (glyphs + 1); --- -2.1.4 - |