platform/upstream/patch.git
3 years ago[CVE-2018-17942] vasnprintf: Fix heap memory overrun bug. 62/275062/1 accepted/tizen_7.0_base accepted/tizen_7.0_base_hotfix accepted/tizen_7.0_base_tool accepted/tizen_7.0_base_tool_hotfix accepted/tizen_8.0_base accepted/tizen_9.0_base accepted/tizen_base accepted/tizen_base_tool tizen_7.0_base tizen_7.0_base_hotfix tizen_8.0_base tizen_9.0_base tizen_base accepted/tizen/7.0/base/20230714.003028 accepted/tizen/7.0/base/hotfix/20230714.003840 accepted/tizen/7.0/base/tool/20221028.122232 accepted/tizen/7.0/base/tool/hotfix/20221115.090817 accepted/tizen/8.0/base/20231005.045008 accepted/tizen/9.0/base/20241030.075444 accepted/tizen/base/20230714.003433 accepted/tizen/base/tool/20220517.015812 accepted/tizen/base/tool/20220530.211849 submit/tizen_7.0_base/20221028.201101 submit/tizen_7.0_base_hotfix/20221115.161601 submit/tizen_base/20220517.015433 submit/tizen_base/20220527.062142 tizen_7.0_m2_release tizen_8.0_m2_release tizen_9.0_m2_release
DongHun Kwak [Mon, 16 May 2022 07:02:42 +0000 (16:02 +0900)]
[CVE-2018-17942] vasnprintf: Fix heap memory overrun bug.

Reported by Ben Pfaff <blp@cs.stanford.edu> in
<https://lists.gnu.org/archive/html/bug-gnulib/2018-09/msg00107.html>.

* lib/vasnprintf.c (convert_to_decimal): Allocate one more byte of
memory.
* tests/test-vasnprintf.c (test_function): Add another test.

Change-Id: I107d30510c01c28390f6a61c4034ea5fe4d20d80

3 years ago[CVE-2019-13636] Don't follow symlinks unless --follow-symlinks is given
Andreas Gruenbacher [Mon, 15 Jul 2019 14:21:48 +0000 (16:21 +0200)]
[CVE-2019-13636] Don't follow symlinks unless --follow-symlinks is given

* src/inp.c (plan_a, plan_b), src/util.c (copy_to_fd, copy_file,
append_to_file): Unless the --follow-symlinks option is given, open files with
the O_NOFOLLOW flag to avoid following symlinks.  So far, we were only doing
that consistently for input files.
* src/util.c (create_backup): When creating empty backup files, (re)create them
with O_CREAT | O_EXCL to avoid following symlinks in that case as well.

Change-Id: Ic1ace0a9b9123cebd9e5a5f6c39bf69b85229fd9

3 years agofix: Security patch for CVE-2018-6951 02/272502/1 accepted/tizen/base/tool/20220321.221713 submit/tizen_base/20220318.061037
DongHun Kwak [Fri, 18 Mar 2022 03:01:10 +0000 (12:01 +0900)]
fix: Security patch for CVE-2018-6951

CVE Report
https://nvd.nist.gov/vuln/detail/CVE-2018-6951

Security patch
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a

Change-Id: I47feb135b9a86cf68a336627225e4c442956f732

3 years agoBump to patch 2.7.6 41/269741/1 sandbox/dh0128.kwak/patch-2.7.6-20220120 accepted/tizen/base/tool/20220127.053826 submit/tizen_base/20220120.064941
DongHun Kwak [Thu, 20 Jan 2022 06:03:48 +0000 (15:03 +0900)]
Bump to patch 2.7.6

Change-Id: I8bfc8f686ebe93455172e113bd7b129c67b17adc

3 years agoImported Upstream version 2.7.6 upstream upstream/2.7.6
DongHun Kwak [Thu, 20 Jan 2022 05:18:21 +0000 (14:18 +0900)]
Imported Upstream version 2.7.6

3 years agoImported Upstream version 2.7.5 upstream/2.7.5
DongHun Kwak [Thu, 20 Jan 2022 05:18:14 +0000 (14:18 +0900)]
Imported Upstream version 2.7.5

3 years agoImported Upstream version 2.7.4 upstream/2.7.4
DongHun Kwak [Thu, 20 Jan 2022 05:18:05 +0000 (14:18 +0900)]
Imported Upstream version 2.7.4

3 years agoImported Upstream version 2.7.3 upstream/2.7.3
DongHun Kwak [Thu, 20 Jan 2022 05:17:58 +0000 (14:17 +0900)]
Imported Upstream version 2.7.3

3 years agoImported Upstream version 2.7.2 upstream/2.7.2
DongHun Kwak [Thu, 20 Jan 2022 05:17:49 +0000 (14:17 +0900)]
Imported Upstream version 2.7.2

3 years agoImported Upstream version 2.7.1 upstream/2.7.1
DongHun Kwak [Thu, 20 Jan 2022 05:17:41 +0000 (14:17 +0900)]
Imported Upstream version 2.7.1

12 years agoImported Upstream version 2.7 upstream/2.7
Anas Nashif [Tue, 16 Oct 2012 15:32:58 +0000 (08:32 -0700)]
Imported Upstream version 2.7