This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "This git reposit keeps all the patches of the project.".
The branch, master has been updated
via 0fc7eccec98d1579ba52c1530e7a3daaa3260812 (commit)
from 6e2aac951d121133a482b12688d2a6260c3ba2aa (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit 0fc7eccec98d1579ba52c1530e7a3daaa3260812
Author: Schantl Stefan <Stevee(a)ipfire.org>
Date: Tue Mar 2 09:38:14 2010 +0100
Delete a bunch of patches.
* libxslt: Won´t be portetd.
* logrotate: Ported to naoki.
* nmap: Ported to naoki.
-----------------------------------------------------------------------
Summary of changes:
libxslt/libxslt-1.1.24-CVE-2008-2935.patch | 173 ----------------------------
logrotate/logrotate-3.7.7-curdir.patch | 15 ---
logrotate/logrotate-3.7.7-toolarge.patch | 17 ---
nmap/nmap-5.00-mktemp.patch | 23 ----
4 files changed, 0 insertions(+), 228 deletions(-)
delete mode 100644 libxslt/libxslt-1.1.24-CVE-2008-2935.patch
delete mode 100644 logrotate/logrotate-3.7.7-curdir.patch
delete mode 100644 logrotate/logrotate-3.7.7-toolarge.patch
delete mode 100644 nmap/nmap-5.00-mktemp.patch
Difference in files:
diff --git a/libxslt/libxslt-1.1.24-CVE-2008-2935.patch b/libxslt/libxslt-1.1.24-CVE-2008-2935.patch
deleted file mode 100644
index 0fbf8f6..0000000
--- a/libxslt/libxslt-1.1.24-CVE-2008-2935.patch
+++ /dev/null
@@ -1,173 +0,0 @@
-Index: libexslt/crypto.c
-===================================================================
---- libexslt/crypto.c (revision 1485)
-+++ libexslt/crypto.c (working copy)
-@@ -317,13 +317,13 @@ exsltCryptoCryptoApiRc4Decrypt (xmlXPath
- #define PLATFORM_MD5 GCRY_MD_MD5
- #define PLATFORM_SHA1 GCRY_MD_SHA1
-
--#ifdef HAVE_SYS_TYPES_H
--# include <sys/types.h>
--#endif
--#ifdef HAVE_STDINT_H
--# include <stdint.h>
--#endif
--
-+#ifdef HAVE_SYS_TYPES_H
-+# include <sys/types.h>
-+#endif
-+#ifdef HAVE_STDINT_H
-+# include <stdint.h>
-+#endif
-+
- #ifdef HAVE_SYS_SELECT_H
- #include <sys/select.h> /* needed by gcrypt.h 4 Jul 04 */
- #endif
-@@ -595,11 +595,13 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
- int str_len = 0, bin_len = 0, hex_len = 0;
- xmlChar *key = NULL, *str = NULL, *padkey = NULL;
- xmlChar *bin = NULL, *hex = NULL;
-+ xsltTransformContextPtr tctxt = NULL;
-
-- if ((nargs < 1) || (nargs > 3)) {
-+ if (nargs != 2) {
- xmlXPathSetArityError (ctxt);
- return;
- }
-+ tctxt = xsltXPathGetTransformContext(ctxt);
-
- str = xmlXPathPopString (ctxt);
- str_len = xmlUTF8Strlen (str);
-@@ -611,7 +613,7 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
- }
-
- key = xmlXPathPopString (ctxt);
-- key_len = xmlUTF8Strlen (str);
-+ key_len = xmlUTF8Strlen (key);
-
- if (key_len == 0) {
- xmlXPathReturnEmptyString (ctxt);
-@@ -620,15 +622,33 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
- return;
- }
-
-- padkey = xmlMallocAtomic (RC4_KEY_LENGTH);
-+ padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1);
-+ if (padkey == NULL) {
-+ xsltTransformError(tctxt, NULL, tctxt->inst,
-+ "exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n");
-+ tctxt->state = XSLT_STATE_STOPPED;
-+ xmlXPathReturnEmptyString (ctxt);
-+ goto done;
-+ }
-+ memset(padkey, 0, RC4_KEY_LENGTH + 1);
-+
- key_size = xmlUTF8Strsize (key, key_len);
-+ if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) {
-+ xsltTransformError(tctxt, NULL, tctxt->inst,
-+ "exsltCryptoRc4EncryptFunction: key size too long or key broken\n");
-+ tctxt->state = XSLT_STATE_STOPPED;
-+ xmlXPathReturnEmptyString (ctxt);
-+ goto done;
-+ }
- memcpy (padkey, key, key_size);
-- memset (padkey + key_size, '\0', sizeof (padkey));
-
- /* encrypt it */
- bin_len = str_len;
- bin = xmlStrdup (str);
- if (bin == NULL) {
-+ xsltTransformError(tctxt, NULL, tctxt->inst,
-+ "exsltCryptoRc4EncryptFunction: Failed to allocate string\n");
-+ tctxt->state = XSLT_STATE_STOPPED;
- xmlXPathReturnEmptyString (ctxt);
- goto done;
- }
-@@ -638,6 +658,9 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
- hex_len = str_len * 2 + 1;
- hex = xmlMallocAtomic (hex_len);
- if (hex == NULL) {
-+ xsltTransformError(tctxt, NULL, tctxt->inst,
-+ "exsltCryptoRc4EncryptFunction: Failed to allocate result\n");
-+ tctxt->state = XSLT_STATE_STOPPED;
- xmlXPathReturnEmptyString (ctxt);
- goto done;
- }
-@@ -670,11 +693,13 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
- int str_len = 0, bin_len = 0, ret_len = 0;
- xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin =
- NULL, *ret = NULL;
-+ xsltTransformContextPtr tctxt = NULL;
-
-- if ((nargs < 1) || (nargs > 3)) {
-+ if (nargs != 2) {
- xmlXPathSetArityError (ctxt);
- return;
- }
-+ tctxt = xsltXPathGetTransformContext(ctxt);
-
- str = xmlXPathPopString (ctxt);
- str_len = xmlUTF8Strlen (str);
-@@ -686,7 +711,7 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
- }
-
- key = xmlXPathPopString (ctxt);
-- key_len = xmlUTF8Strlen (str);
-+ key_len = xmlUTF8Strlen (key);
-
- if (key_len == 0) {
- xmlXPathReturnEmptyString (ctxt);
-@@ -695,22 +720,51 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
- return;
- }
-
-- padkey = xmlMallocAtomic (RC4_KEY_LENGTH);
-+ padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1);
-+ if (padkey == NULL) {
-+ xsltTransformError(tctxt, NULL, tctxt->inst,
-+ "exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n");
-+ tctxt->state = XSLT_STATE_STOPPED;
-+ xmlXPathReturnEmptyString (ctxt);
-+ goto done;
-+ }
-+ memset(padkey, 0, RC4_KEY_LENGTH + 1);
- key_size = xmlUTF8Strsize (key, key_len);
-+ if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) {
-+ xsltTransformError(tctxt, NULL, tctxt->inst,
-+ "exsltCryptoRc4EncryptFunction: key size too long or key broken\n");
-+ tctxt->state = XSLT_STATE_STOPPED;
-+ xmlXPathReturnEmptyString (ctxt);
-+ goto done;
-+ }
- memcpy (padkey, key, key_size);
-- memset (padkey + key_size, '\0', sizeof (padkey));
-
- /* decode hex to binary */
- bin_len = str_len;
- bin = xmlMallocAtomic (bin_len);
-+ if (bin == NULL) {
-+ xsltTransformError(tctxt, NULL, tctxt->inst,
-+ "exsltCryptoRc4EncryptFunction: Failed to allocate string\n");
-+ tctxt->state = XSLT_STATE_STOPPED;
-+ xmlXPathReturnEmptyString (ctxt);
-+ goto done;
-+ }
- ret_len = exsltCryptoHex2Bin (str, str_len, bin, bin_len);
-
- /* decrypt the binary blob */
- ret = xmlMallocAtomic (ret_len);
-+ if (ret == NULL) {
-+ xsltTransformError(tctxt, NULL, tctxt->inst,
-+ "exsltCryptoRc4EncryptFunction: Failed to allocate result\n");
-+ tctxt->state = XSLT_STATE_STOPPED;
-+ xmlXPathReturnEmptyString (ctxt);
-+ goto done;
-+ }
- PLATFORM_RC4_DECRYPT (ctxt, padkey, bin, ret_len, ret, ret_len);
-
- xmlXPathReturnString (ctxt, ret);
-
-+done:
- if (key != NULL)
- xmlFree (key);
- if (str != NULL)
diff --git a/logrotate/logrotate-3.7.7-curdir.patch b/logrotate/logrotate-3.7.7-curdir.patch
deleted file mode 100644
index 8ae8f06..0000000
--- a/logrotate/logrotate-3.7.7-curdir.patch
+++ /dev/null
@@ -1,15 +0,0 @@
-diff -up logrotate-3.7.7/config.c.curdir logrotate-3.7.7/config.c
---- logrotate-3.7.7/config.c.curdir 2008-05-09 09:28:59.000000000 +0200
-+++ logrotate-3.7.7/config.c 2008-11-20 15:35:05.000000000 +0100
-@@ -316,11 +316,6 @@ static int readConfigPath(const char *pa
- DIR *dirp;
-
- here = open(".", O_RDONLY);
-- if (here < 0) {
-- message(MESS_ERROR, "cannot open current directory: %s\n",
-- strerror(errno));
-- return 1;
-- }
-
- if ((dirp = opendir(path)) == NULL) {
- message(MESS_ERROR, "cannot open directory %s: %s\n", path,
diff --git a/logrotate/logrotate-3.7.7-toolarge.patch b/logrotate/logrotate-3.7.7-toolarge.patch
deleted file mode 100644
index 68027c8..0000000
--- a/logrotate/logrotate-3.7.7-toolarge.patch
+++ /dev/null
@@ -1,17 +0,0 @@
-diff -up logrotate-3.7.7/config.c.toolarge logrotate-3.7.7/config.c
---- logrotate-3.7.7/config.c.toolarge 2008-11-21 12:57:25.000000000 +0100
-+++ logrotate-3.7.7/config.c 2008-11-21 12:57:41.000000000 +0100
-@@ -530,6 +530,13 @@ static int readConfigFile(const char *co
-
- length = sb.st_size;
-
-+ if (length > 0xffffff) {
-+ message(MESS_ERROR, "file %s too large, probably not a config file.\n",
-+ configFile);
-+ close(fd);
-+ return 1;
-+ }
-+
- buf = alloca(length + 2);
- if (!buf) {
- message(MESS_ERROR, "alloca() of %d bytes failed\n", (int) length);
diff --git a/nmap/nmap-5.00-mktemp.patch b/nmap/nmap-5.00-mktemp.patch
deleted file mode 100644
index 68baffe..0000000
--- a/nmap/nmap-5.00-mktemp.patch
+++ /dev/null
@@ -1,23 +0,0 @@
---- nmap-4.03/shtool.mktemp 2006-05-10 13:09:34.000000000 +0200
-+++ nmap-4.03/shtool 2006-05-10 13:13:58.000000000 +0200
-@@ -579,15 +579,11 @@
- else
- tmpdir="/tmp"
- fi
-- tmpdir="$tmpdir/.shtool.$$"
-- ( umask 077
-- rm -rf "$tmpdir" >/dev/null 2>&1 || true
-- mkdir "$tmpdir" >/dev/null 2>&1
-- if [ $? -ne 0 ]; then
-- echo "$msgprefix:Error: failed to create temporary directory \`$tmpdir'" 1>&2
-- exit 1
-- fi
-- )
-+ tmpdir=`mktemp -p $tmpdir -d`
-+ if [ $? -ne 0 ]; then
-+ echo "$msgprefix:Error: failed to create temporary directory \`$tmpdir'" 1>&2
-+ exit 1
-+ fi
-
- # create (implicitly) secure temporary file
- tmpfile="$tmpdir/shtool.tmp"
hooks/post-receive
--
This git reposit keeps all the patches of the project.