summaryrefslogtreecommitdiff
path: root/gnu/packages/patches/libxml2-CVE-2017-7376.patch
diff options
context:
space:
mode:
authorMarius Bakke <mbakke@fastmail.com>2017-10-10 22:36:42 +0200
committerMarius Bakke <mbakke@fastmail.com>2017-10-10 22:36:42 +0200
commitc09629520b4fa93abed09429d512fa4aee35128c (patch)
treee80391499221689d7a7d24706d30ed4aca1f75bd /gnu/packages/patches/libxml2-CVE-2017-7376.patch
parent1e28118d8d599277d77ee6858a1e37e9791ba445 (diff)
downloadguix-patches-c09629520b4fa93abed09429d512fa4aee35128c.tar
guix-patches-c09629520b4fa93abed09429d512fa4aee35128c.tar.gz
gnu: libxml2: Update to 2.9.6.
While at it, remove leftover patches since libxml2/fixed went missing without conflict in c01ef97594a8b06e884906a5efbdfacf8ba33dc3. * gnu/packages/patches/libxml2-CVE-2017-0663.patch, gnu/packages/patches/libxml2-CVE-2017-7375.patch, gnu/packages/patches/libxml2-CVE-2017-7376.patch, gnu/packages/patches/libxml2-CVE-2017-9047+CVE-2017-9048.patch, gnu/packages/patches/libxml2-CVE-2017-9049+CVE-2017-9050.patch: Delete files. * gnu/local.mk (dist_patch_DATA): Remove them. * gnu/packages/xml.scm (libxml2): Update to 2.9.6.
Diffstat (limited to 'gnu/packages/patches/libxml2-CVE-2017-7376.patch')
-rw-r--r--gnu/packages/patches/libxml2-CVE-2017-7376.patch41
1 files changed, 0 insertions, 41 deletions
diff --git a/gnu/packages/patches/libxml2-CVE-2017-7376.patch b/gnu/packages/patches/libxml2-CVE-2017-7376.patch
deleted file mode 100644
index 5b9e45bd83..0000000000
--- a/gnu/packages/patches/libxml2-CVE-2017-7376.patch
+++ /dev/null
@@ -1,41 +0,0 @@
-Fix CVE-2017-7376:
-
-https://bugzilla.gnome.org/show_bug.cgi?id=780690 (not yet public)
-https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7376
-https://security-tracker.debian.org/tracker/CVE-2017-7376
-
-Patch copied from upstream source repository:
-
-https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
-
-From 5dca9eea1bd4263bfa4d037ab2443de1cd730f7e Mon Sep 17 00:00:00 2001
-From: Daniel Veillard <veillard@redhat.com>
-Date: Fri, 7 Apr 2017 17:13:28 +0200
-Subject: [PATCH] Increase buffer space for port in HTTP redirect support
-
-For https://bugzilla.gnome.org/show_bug.cgi?id=780690
-
-nanohttp.c: the code wrongly assumed a short int port value.
----
- nanohttp.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/nanohttp.c b/nanohttp.c
-index e109ad75..373425de 100644
---- a/nanohttp.c
-+++ b/nanohttp.c
-@@ -1423,9 +1423,9 @@ retry:
- if (ctxt->port != 80) {
- /* reserve space for ':xxxxx', incl. potential proxy */
- if (proxy)
-- blen += 12;
-+ blen += 17;
- else
-- blen += 6;
-+ blen += 11;
- }
- bp = (char*)xmlMallocAtomic(blen);
- if ( bp == NULL ) {
---
-2.14.1
-