Fix potential root exploit.
THE FREEBSD PORT IS NOT VULNERABLE AS IT DOES NOT SET THE SUID BIT, YOU ARE ONLY VULNERABLE, IF YOU SET IT ON YOUR OWN! Submitted by: maintainer
This commit is contained in:
parent
44ad5877b9
commit
2799d745c3
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=81618
2 changed files with 12 additions and 1 deletions
|
@ -7,7 +7,7 @@
|
|||
|
||||
PORTNAME= cdrdao
|
||||
PORTVERSION= 1.1.7
|
||||
PORTREVISION= 2
|
||||
PORTREVISION= 3
|
||||
CATEGORIES= sysutils audio
|
||||
MASTER_SITES= ${MASTER_SITE_SOURCEFORGE}
|
||||
MASTER_SITE_SUBDIR= ${PORTNAME}
|
||||
|
|
11
sysutils/cdrdao/files/patch-scsilib::libscg::scsiopen.c
Normal file
11
sysutils/cdrdao/files/patch-scsilib::libscg::scsiopen.c
Normal file
|
@ -0,0 +1,11 @@
|
|||
--- scsilib/libscg/scsiopen.c.orig Sun Nov 25 16:35:10 2001
|
||||
+++ scsilib/libscg/scsiopen.c Tue May 20 23:01:01 2003
|
||||
@@ -239,7 +239,7 @@
|
||||
}
|
||||
if (scg__open(scgp, devname) <= 0) {
|
||||
if (errs && scgp->errstr)
|
||||
- js_snprintf(errs, slen, scgp->errstr);
|
||||
+ js_snprintf(errs, slen, "%s", scgp->errstr);
|
||||
scg_sfree(scgp);
|
||||
return ((SCSI *)0);
|
||||
}
|
Loading…
Reference in a new issue