Fix potential root exploit.
THE FREEBSD PORT DOES NOT SET THE SUID BIT, YOU ARE ONLY VULNERABLE IF YOU SET IT ON YOUR OWN! See http://marc.theaimsgroup.com/?l=bugtraq&m=105285564307225&w=2 for more. Submitted by: maintainer
This commit is contained in:
parent
400bbbe173
commit
063fc0a057
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=81615
2 changed files with 12 additions and 0 deletions
|
@ -7,6 +7,7 @@
|
|||
|
||||
PORTNAME= sformat
|
||||
PORTVERSION= 3.5
|
||||
PORTREVISON= 1
|
||||
CATEGORIES= sysutils
|
||||
MASTER_SITES= ftp://ftp.zeist.de/pub/distfiles/ \
|
||||
ftp://ftp.berlios.de/pub/sformat/
|
||||
|
|
11
sysutils/sformat/files/patch-libscg::scsiopen.c
Normal file
11
sysutils/sformat/files/patch-libscg::scsiopen.c
Normal file
|
@ -0,0 +1,11 @@
|
|||
--- libscg/scsiopen.c.orig Sun Mar 18 14:54:18 2001
|
||||
+++ libscg/scsiopen.c Tue May 20 22:58:07 2003
|
||||
@@ -239,7 +239,7 @@
|
||||
}
|
||||
if (scg__open(scgp, devname) <= 0) {
|
||||
if (errs && scgp->errstr)
|
||||
- js_snprintf(errs, slen, scgp->errstr);
|
||||
+ js_snprintf(errs, slen, "%s", scgp->errstr);
|
||||
scg_sfree(scgp);
|
||||
return ((SCSI *)0);
|
||||
}
|
Loading…
Reference in a new issue