X-Git-Url: http://git.hcoop.net/hcoop/debian/exim4.git/blobdiff_plain/7375d27e3d0ff85d8836e30742725b1e8e923ddc..50afd7598c8781f66e103d8421d69aed0d69f884:/debian/patches/82_Fix-base64d-buffer-size-CVE-2018-6789.patch diff --git a/debian/patches/82_Fix-base64d-buffer-size-CVE-2018-6789.patch b/debian/patches/82_Fix-base64d-buffer-size-CVE-2018-6789.patch deleted file mode 100644 index 146339c..0000000 --- a/debian/patches/82_Fix-base64d-buffer-size-CVE-2018-6789.patch +++ /dev/null @@ -1,29 +0,0 @@ -Description: Fix base64d() buffer size (CVE-2018-6789) - Credits for discovering this bug: Meh Chang -Origin: vendor -Bug-Debian: https://bugs.debian.org/890000 -Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2018-6789 -Forwarded: not-needed -Author: "Heiko Schlittermann (HS12-RIPE)" -Last-Update: 2018-02-10 ---- - ---- a/src/base64.c -+++ b/src/base64.c -@@ -152,10 +152,14 @@ static uschar dec64table[] = { - int - b64decode(uschar *code, uschar **ptr) - { -+ - int x, y; --uschar *result = store_get(3*(Ustrlen(code)/4) + 1); -+uschar *result; - --*ptr = result; -+{ -+ int l = Ustrlen(code); -+ *ptr = result = store_get(1 + l/4 * 3 + l%4); -+} - - /* Each cycle of the loop handles a quantum of 4 input bytes. For the last - quantum this may decode to 1, 2, or 3 output bytes. */