uboot: (firmwareOdroidC2/C4) don't invoke patch tool, use patches = [] instead
https://github.com/NixOS/nixpkgs/blob/master/pkgs/stdenv/generic/setup.sh#L948 this can do it nicely. Signed-off-by: Anton Arapov <anton@deadbeef.mx>
This commit is contained in:
commit
56de2bcd43
30691 changed files with 3076956 additions and 0 deletions
18
pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15678.patch
Normal file
18
pkgs/tools/admin/tightvnc/1.3.10-CVE-2019-15678.patch
Normal file
|
|
@ -0,0 +1,18 @@
|
|||
Adapted from https://github.com/LibVNC/libvncserver/commit/c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a
|
||||
diff --git a/vncviewer/rfbproto.c b/vncviewer/rfbproto.c
|
||||
index 04b0230..47a6863 100644
|
||||
--- a/vncviewer/rfbproto.c
|
||||
+++ b/vncviewer/rfbproto.c
|
||||
@@ -1217,6 +1217,12 @@ HandleRFBServerMessage()
|
||||
if (serverCutText)
|
||||
free(serverCutText);
|
||||
|
||||
+ if (msg.sct.length > 1<<20) {
|
||||
+ fprintf(stderr,"Ignoring too big cut text length sent by server: %u B > 1 MB\n",
|
||||
+ (unsigned int)msg.sct.length);
|
||||
+ return False;
|
||||
+ }
|
||||
+
|
||||
serverCutText = malloc(msg.sct.length+1);
|
||||
|
||||
if (!ReadFromRFBServer(serverCutText, msg.sct.length))
|
||||
Loading…
Add table
Add a link
Reference in a new issue