aboutsummaryrefslogtreecommitdiff
path: root/debian/patches/1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch
diff options
context:
space:
mode:
authorMihai Moldovan <ionic@ionic.de>2015-02-16 09:40:16 +0100
committerMike Gabriel <mike.gabriel@das-netzwerkteam.de>2015-02-16 10:05:29 +0100
commit650181c23b32378b4ec829880cc20700bf5b2ddf (patch)
tree200a5ce858cd5af407759ea70d447956a5712f2d /debian/patches/1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch
parentae898ff13b4782239a152b43125aa1fc0b80ba3d (diff)
downloadnx-libs-650181c23b32378b4ec829880cc20700bf5b2ddf.tar.gz
nx-libs-650181c23b32378b4ec829880cc20700bf5b2ddf.tar.bz2
nx-libs-650181c23b32378b4ec829880cc20700bf5b2ddf.zip
CVE security review: Add 1041-nx-X11-lib-font-fc-fserve.c-initialize-remaining-buf.patch & 1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch.
- Add 1041-nx-X11-lib-font-fc-fserve.c-initialize-remaining-buf.patch. Initialize remaining bufleft variables (nx-X11/lib/font/fc/fserve.c). - Add 1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch. Do proper input validation to fix for CVE-2011-2895.
Diffstat (limited to 'debian/patches/1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch')
-rw-r--r--debian/patches/1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/debian/patches/1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch b/debian/patches/1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch
index 9e5d00e98..04910353c 100644
--- a/debian/patches/1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch
+++ b/debian/patches/1042-Do-proper-input-validation-to-fix-for-CVE-2011-2895.patch
@@ -1,7 +1,7 @@
From 6acafc9334828da22446380c81af81bde14b5d86 Mon Sep 17 00:00:00 2001
From: Joerg Sonnenberger <joerg@britannica.bec.de>
Date: Sun, 21 Aug 2011 18:51:53 +0200
-Subject: [PATCH 08/15] Do proper input validation to fix for CVE-2011-2895.
+Subject: [PATCH 02/02] Do proper input validation to fix for CVE-2011-2895.
It ensures that all valid input can be decompressed, checks that the
overflow conditions doesn't happen and generally tightens the