aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/ppp/patches/700-radius-Prevent-buffer-overflow-in-rc_mksid.patch
diff options
context:
space:
mode:
authorHans Dedecker <dedeckeh@gmail.com>2020-04-05 22:26:33 +0200
committerHans Dedecker <dedeckeh@gmail.com>2020-04-06 20:42:45 +0200
commitae06a650d68026530beec4196869706866c2e4b1 (patch)
tree3ca7160b971defd1478918d6dd1acbfe28ce21a0 /package/network/services/ppp/patches/700-radius-Prevent-buffer-overflow-in-rc_mksid.patch
parent8af80e79bd5b750bf9a5ab01a6ecdb3971248bae (diff)
downloadupstream-ae06a650d68026530beec4196869706866c2e4b1.tar.gz
upstream-ae06a650d68026530beec4196869706866c2e4b1.tar.bz2
upstream-ae06a650d68026530beec4196869706866c2e4b1.zip
ppp: update to version 2.4.8.git-2020-03-21
Use upstream latest git HEAD as it allows to remove the patches 700-radius-Prevent-buffer-overflow-in-rc_mksid, 701-pppd-Fix-bounds-check-in-EAP-code and 702-pppd-Ignore-received-EAP-messages-when-not-doing-EAP and take in other fixes. 41a7323 pppd: Fixed spelling 'unkown' => 'unknown' (#141) 6b014be pppd: Print version information to stdout instead of stderr (#133) cba2736 pppd: Add RFC1990 (Multilink) to the See Also section of the man page f2f9554 pppd: Add mppe.h to the list of headers to install if MPPE is defined ae54fcf pppd: Obfuscate password argument string 8d45443 pppd: Ignore received EAP messages when not doing EAP 8d7970b pppd: Fix bounds check in EAP code 858976b radius: Prevent buffer overflow in rc_mksid() Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
Diffstat (limited to 'package/network/services/ppp/patches/700-radius-Prevent-buffer-overflow-in-rc_mksid.patch')
-rw-r--r--package/network/services/ppp/patches/700-radius-Prevent-buffer-overflow-in-rc_mksid.patch30
1 files changed, 0 insertions, 30 deletions
diff --git a/package/network/services/ppp/patches/700-radius-Prevent-buffer-overflow-in-rc_mksid.patch b/package/network/services/ppp/patches/700-radius-Prevent-buffer-overflow-in-rc_mksid.patch
deleted file mode 100644
index 1c5722e6dd..0000000000
--- a/package/network/services/ppp/patches/700-radius-Prevent-buffer-overflow-in-rc_mksid.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From 858976b1fc3107f1261aae337831959b511b83c2 Mon Sep 17 00:00:00 2001
-From: Paul Mackerras <paulus@ozlabs.org>
-Date: Sat, 4 Jan 2020 12:01:32 +1100
-Subject: [PATCH] radius: Prevent buffer overflow in rc_mksid()
-
-On some systems getpid() can return a value greater than 65535.
-Increase the size of buf[] to allow for this, and use slprintf()
-to make sure we never overflow it.
-
-Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
----
- pppd/plugins/radius/util.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/pppd/plugins/radius/util.c b/pppd/plugins/radius/util.c
-index 6f976a712951..740131e8377c 100644
---- a/pppd/plugins/radius/util.c
-+++ b/pppd/plugins/radius/util.c
-@@ -73,9 +73,9 @@ void rc_mdelay(int msecs)
- char *
- rc_mksid (void)
- {
-- static char buf[15];
-+ static char buf[32];
- static unsigned short int cnt = 0;
-- sprintf (buf, "%08lX%04X%02hX",
-+ slprintf(buf, sizeof(buf), "%08lX%04X%02hX",
- (unsigned long int) time (NULL),
- (unsigned int) getpid (),
- cnt & 0xFF);