summary refs log tree commit diff
path: root/gnu/packages/patches/procmail-CVE-2017-16844.patch
diff options
context:
space:
mode:
authorLeo Famulari <leo@famulari.name>2017-11-21 12:47:40 -0500
committerLeo Famulari <leo@famulari.name>2017-11-21 21:54:39 -0500
commitc297e965d51a332b15bccbb180d6f9a400cb8805 (patch)
treeec3103d91d3345c138674c9b7354d3f5c4c251c2 /gnu/packages/patches/procmail-CVE-2017-16844.patch
parent3ebbf6d2189c8854535fadaa6491c5354aa735a8 (diff)
downloadguix-c297e965d51a332b15bccbb180d6f9a400cb8805.tar.gz
gnu: procmail: Fix CVE-2017-16844.
* gnu/packages/patches/procmail-CVE-2017-16844.patch: New file.
* gnu/local.mk (dist_patch_DATA): Add it.
* gnu/packages/mail.scm (procmail)[source]: Use it.
Diffstat (limited to 'gnu/packages/patches/procmail-CVE-2017-16844.patch')
-rw-r--r--gnu/packages/patches/procmail-CVE-2017-16844.patch25
1 files changed, 25 insertions, 0 deletions
diff --git a/gnu/packages/patches/procmail-CVE-2017-16844.patch b/gnu/packages/patches/procmail-CVE-2017-16844.patch
new file mode 100644
index 0000000000..b96540c8cd
--- /dev/null
+++ b/gnu/packages/patches/procmail-CVE-2017-16844.patch
@@ -0,0 +1,25 @@
+Fix CVE-2017-16844:
+
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16844
+https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876511
+
+Patch copied from Debian procmail package 3.22-26:
+
+http://http.debian.net/debian/pool/main/p/procmail/procmail_3.22-26.debian.tar.xz
+
+From: Santiago Vila <sanvila@debian.org>
+Subject: Fix heap-based buffer overflow in loadbuf()
+Bug-Debian: http://bugs.debian.org/876511
+X-Debian-version: 3.22-26
+
+--- a/src/formisc.c
++++ b/src/formisc.c
+@@ -103,7 +103,7 @@
+ }
+ 							    /* append to buf */
+ void loadbuf(text,len)const char*const text;const size_t len;
+-{ if(buffilled+len>buflen)			  /* buf can't hold the text */
++{ while(buffilled+len>buflen)			  /* buf can't hold the text */
+      buf=realloc(buf,buflen+=Bsize);
+   tmemmove(buf+buffilled,text,len);buffilled+=len;
+ }