diff options
Diffstat (limited to 'debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch')
-rw-r--r-- | debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch | 25 |
1 files changed, 0 insertions, 25 deletions
diff --git a/debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch b/debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch deleted file mode 100644 index 1a0acd7..0000000 --- a/debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch +++ /dev/null @@ -1,25 +0,0 @@ -From: Karel Zak <kzak@redhat.com> -Date: Thu, 21 Mar 2024 11:16:20 +0100 -Subject: wall: fix escape sequence Injection [CVE-2024-28085] - -Let's use for all cases the same output function. - -Reported-by: Skyler Ferrante <sjf5462@rit.edu> -Signed-off-by: Karel Zak <kzak@redhat.com> ---- - term-utils/wall.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/term-utils/wall.c b/term-utils/wall.c -index 377db45..1e7e9ab 100644 ---- a/term-utils/wall.c -+++ b/term-utils/wall.c -@@ -328,7 +328,7 @@ static char *makemsg(char *fname, char **mvec, int mvecsz, - int i; - - for (i = 0; i < mvecsz; i++) { -- fputs(mvec[i], fs); -+ fputs_careful(mvec[i], fs, '^', true, TERM_WIDTH); - if (i < mvecsz - 1) - fputc(' ', fs); - } |