This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "This git reposit keeps all the patches of the project.".
The branch, master has been updated via 0fc7eccec98d1579ba52c1530e7a3daaa3260812 (commit) from 6e2aac951d121133a482b12688d2a6260c3ba2aa (commit)
Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below.
- Log ----------------------------------------------------------------- commit 0fc7eccec98d1579ba52c1530e7a3daaa3260812 Author: Schantl Stefan Stevee@ipfire.org Date: Tue Mar 2 09:38:14 2010 +0100
Delete a bunch of patches.
* libxslt: Won´t be portetd. * logrotate: Ported to naoki. * nmap: Ported to naoki.
-----------------------------------------------------------------------
Summary of changes: libxslt/libxslt-1.1.24-CVE-2008-2935.patch | 173 ---------------------------- logrotate/logrotate-3.7.7-curdir.patch | 15 --- logrotate/logrotate-3.7.7-toolarge.patch | 17 --- nmap/nmap-5.00-mktemp.patch | 23 ---- 4 files changed, 0 insertions(+), 228 deletions(-) delete mode 100644 libxslt/libxslt-1.1.24-CVE-2008-2935.patch delete mode 100644 logrotate/logrotate-3.7.7-curdir.patch delete mode 100644 logrotate/logrotate-3.7.7-toolarge.patch delete mode 100644 nmap/nmap-5.00-mktemp.patch
Difference in files: diff --git a/libxslt/libxslt-1.1.24-CVE-2008-2935.patch b/libxslt/libxslt-1.1.24-CVE-2008-2935.patch deleted file mode 100644 index 0fbf8f6..0000000 --- a/libxslt/libxslt-1.1.24-CVE-2008-2935.patch +++ /dev/null @@ -1,173 +0,0 @@ -Index: libexslt/crypto.c -=================================================================== ---- libexslt/crypto.c (revision 1485) -+++ libexslt/crypto.c (working copy) -@@ -317,13 +317,13 @@ exsltCryptoCryptoApiRc4Decrypt (xmlXPath - #define PLATFORM_MD5 GCRY_MD_MD5 - #define PLATFORM_SHA1 GCRY_MD_SHA1 - --#ifdef HAVE_SYS_TYPES_H --# include <sys/types.h> --#endif --#ifdef HAVE_STDINT_H --# include <stdint.h> --#endif -- -+#ifdef HAVE_SYS_TYPES_H -+# include <sys/types.h> -+#endif -+#ifdef HAVE_STDINT_H -+# include <stdint.h> -+#endif -+ - #ifdef HAVE_SYS_SELECT_H - #include <sys/select.h> /* needed by gcrypt.h 4 Jul 04 */ - #endif -@@ -595,11 +595,13 @@ exsltCryptoRc4EncryptFunction (xmlXPathP - int str_len = 0, bin_len = 0, hex_len = 0; - xmlChar *key = NULL, *str = NULL, *padkey = NULL; - xmlChar *bin = NULL, *hex = NULL; -+ xsltTransformContextPtr tctxt = NULL; - -- if ((nargs < 1) || (nargs > 3)) { -+ if (nargs != 2) { - xmlXPathSetArityError (ctxt); - return; - } -+ tctxt = xsltXPathGetTransformContext(ctxt); - - str = xmlXPathPopString (ctxt); - str_len = xmlUTF8Strlen (str); -@@ -611,7 +613,7 @@ exsltCryptoRc4EncryptFunction (xmlXPathP - } - - key = xmlXPathPopString (ctxt); -- key_len = xmlUTF8Strlen (str); -+ key_len = xmlUTF8Strlen (key); - - if (key_len == 0) { - xmlXPathReturnEmptyString (ctxt); -@@ -620,15 +622,33 @@ exsltCryptoRc4EncryptFunction (xmlXPathP - return; - } - -- padkey = xmlMallocAtomic (RC4_KEY_LENGTH); -+ padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1); -+ if (padkey == NULL) { -+ xsltTransformError(tctxt, NULL, tctxt->inst, -+ "exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n"); -+ tctxt->state = XSLT_STATE_STOPPED; -+ xmlXPathReturnEmptyString (ctxt); -+ goto done; -+ } -+ memset(padkey, 0, RC4_KEY_LENGTH + 1); -+ - key_size = xmlUTF8Strsize (key, key_len); -+ if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) { -+ xsltTransformError(tctxt, NULL, tctxt->inst, -+ "exsltCryptoRc4EncryptFunction: key size too long or key broken\n"); -+ tctxt->state = XSLT_STATE_STOPPED; -+ xmlXPathReturnEmptyString (ctxt); -+ goto done; -+ } - memcpy (padkey, key, key_size); -- memset (padkey + key_size, '\0', sizeof (padkey)); - - /* encrypt it */ - bin_len = str_len; - bin = xmlStrdup (str); - if (bin == NULL) { -+ xsltTransformError(tctxt, NULL, tctxt->inst, -+ "exsltCryptoRc4EncryptFunction: Failed to allocate string\n"); -+ tctxt->state = XSLT_STATE_STOPPED; - xmlXPathReturnEmptyString (ctxt); - goto done; - } -@@ -638,6 +658,9 @@ exsltCryptoRc4EncryptFunction (xmlXPathP - hex_len = str_len * 2 + 1; - hex = xmlMallocAtomic (hex_len); - if (hex == NULL) { -+ xsltTransformError(tctxt, NULL, tctxt->inst, -+ "exsltCryptoRc4EncryptFunction: Failed to allocate result\n"); -+ tctxt->state = XSLT_STATE_STOPPED; - xmlXPathReturnEmptyString (ctxt); - goto done; - } -@@ -670,11 +693,13 @@ exsltCryptoRc4DecryptFunction (xmlXPathP - int str_len = 0, bin_len = 0, ret_len = 0; - xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin = - NULL, *ret = NULL; -+ xsltTransformContextPtr tctxt = NULL; - -- if ((nargs < 1) || (nargs > 3)) { -+ if (nargs != 2) { - xmlXPathSetArityError (ctxt); - return; - } -+ tctxt = xsltXPathGetTransformContext(ctxt); - - str = xmlXPathPopString (ctxt); - str_len = xmlUTF8Strlen (str); -@@ -686,7 +711,7 @@ exsltCryptoRc4DecryptFunction (xmlXPathP - } - - key = xmlXPathPopString (ctxt); -- key_len = xmlUTF8Strlen (str); -+ key_len = xmlUTF8Strlen (key); - - if (key_len == 0) { - xmlXPathReturnEmptyString (ctxt); -@@ -695,22 +720,51 @@ exsltCryptoRc4DecryptFunction (xmlXPathP - return; - } - -- padkey = xmlMallocAtomic (RC4_KEY_LENGTH); -+ padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1); -+ if (padkey == NULL) { -+ xsltTransformError(tctxt, NULL, tctxt->inst, -+ "exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n"); -+ tctxt->state = XSLT_STATE_STOPPED; -+ xmlXPathReturnEmptyString (ctxt); -+ goto done; -+ } -+ memset(padkey, 0, RC4_KEY_LENGTH + 1); - key_size = xmlUTF8Strsize (key, key_len); -+ if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) { -+ xsltTransformError(tctxt, NULL, tctxt->inst, -+ "exsltCryptoRc4EncryptFunction: key size too long or key broken\n"); -+ tctxt->state = XSLT_STATE_STOPPED; -+ xmlXPathReturnEmptyString (ctxt); -+ goto done; -+ } - memcpy (padkey, key, key_size); -- memset (padkey + key_size, '\0', sizeof (padkey)); - - /* decode hex to binary */ - bin_len = str_len; - bin = xmlMallocAtomic (bin_len); -+ if (bin == NULL) { -+ xsltTransformError(tctxt, NULL, tctxt->inst, -+ "exsltCryptoRc4EncryptFunction: Failed to allocate string\n"); -+ tctxt->state = XSLT_STATE_STOPPED; -+ xmlXPathReturnEmptyString (ctxt); -+ goto done; -+ } - ret_len = exsltCryptoHex2Bin (str, str_len, bin, bin_len); - - /* decrypt the binary blob */ - ret = xmlMallocAtomic (ret_len); -+ if (ret == NULL) { -+ xsltTransformError(tctxt, NULL, tctxt->inst, -+ "exsltCryptoRc4EncryptFunction: Failed to allocate result\n"); -+ tctxt->state = XSLT_STATE_STOPPED; -+ xmlXPathReturnEmptyString (ctxt); -+ goto done; -+ } - PLATFORM_RC4_DECRYPT (ctxt, padkey, bin, ret_len, ret, ret_len); - - xmlXPathReturnString (ctxt, ret); - -+done: - if (key != NULL) - xmlFree (key); - if (str != NULL) diff --git a/logrotate/logrotate-3.7.7-curdir.patch b/logrotate/logrotate-3.7.7-curdir.patch deleted file mode 100644 index 8ae8f06..0000000 --- a/logrotate/logrotate-3.7.7-curdir.patch +++ /dev/null @@ -1,15 +0,0 @@ -diff -up logrotate-3.7.7/config.c.curdir logrotate-3.7.7/config.c ---- logrotate-3.7.7/config.c.curdir 2008-05-09 09:28:59.000000000 +0200 -+++ logrotate-3.7.7/config.c 2008-11-20 15:35:05.000000000 +0100 -@@ -316,11 +316,6 @@ static int readConfigPath(const char *pa - DIR *dirp; - - here = open(".", O_RDONLY); -- if (here < 0) { -- message(MESS_ERROR, "cannot open current directory: %s\n", -- strerror(errno)); -- return 1; -- } - - if ((dirp = opendir(path)) == NULL) { - message(MESS_ERROR, "cannot open directory %s: %s\n", path, diff --git a/logrotate/logrotate-3.7.7-toolarge.patch b/logrotate/logrotate-3.7.7-toolarge.patch deleted file mode 100644 index 68027c8..0000000 --- a/logrotate/logrotate-3.7.7-toolarge.patch +++ /dev/null @@ -1,17 +0,0 @@ -diff -up logrotate-3.7.7/config.c.toolarge logrotate-3.7.7/config.c ---- logrotate-3.7.7/config.c.toolarge 2008-11-21 12:57:25.000000000 +0100 -+++ logrotate-3.7.7/config.c 2008-11-21 12:57:41.000000000 +0100 -@@ -530,6 +530,13 @@ static int readConfigFile(const char *co - - length = sb.st_size; - -+ if (length > 0xffffff) { -+ message(MESS_ERROR, "file %s too large, probably not a config file.\n", -+ configFile); -+ close(fd); -+ return 1; -+ } -+ - buf = alloca(length + 2); - if (!buf) { - message(MESS_ERROR, "alloca() of %d bytes failed\n", (int) length); diff --git a/nmap/nmap-5.00-mktemp.patch b/nmap/nmap-5.00-mktemp.patch deleted file mode 100644 index 68baffe..0000000 --- a/nmap/nmap-5.00-mktemp.patch +++ /dev/null @@ -1,23 +0,0 @@ ---- nmap-4.03/shtool.mktemp 2006-05-10 13:09:34.000000000 +0200 -+++ nmap-4.03/shtool 2006-05-10 13:13:58.000000000 +0200 -@@ -579,15 +579,11 @@ - else - tmpdir="/tmp" - fi -- tmpdir="$tmpdir/.shtool.$$" -- ( umask 077 -- rm -rf "$tmpdir" >/dev/null 2>&1 || true -- mkdir "$tmpdir" >/dev/null 2>&1 -- if [ $? -ne 0 ]; then -- echo "$msgprefix:Error: failed to create temporary directory `$tmpdir'" 1>&2 -- exit 1 -- fi -- ) -+ tmpdir=`mktemp -p $tmpdir -d` -+ if [ $? -ne 0 ]; then -+ echo "$msgprefix:Error: failed to create temporary directory `$tmpdir'" 1>&2 -+ exit 1 -+ fi - - # create (implicitly) secure temporary file - tmpfile="$tmpdir/shtool.tmp"
hooks/post-receive -- This git reposit keeps all the patches of the project.