rpms/python-crypto/EL-4 python-crypto-fix_buffer_overflow.patch, NONE, 1.1
Thorsten Leemhuis
thl at fedoraproject.org
Fri Feb 13 17:17:50 UTC 2009
- Previous message (by thread): rpms/ogre/devel .cvsignore, 1.16, 1.17 ogre.spec, 1.44, 1.45 sources, 1.17, 1.18
- Next message (by thread): rpms/diffutils/devel diffutils-sdiff-E.patch, NONE, 1.1 diffutils.spec, 1.27, 1.28
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: thl
Update of /cvs/pkgs/rpms/python-crypto/EL-4
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv13897
Added Files:
python-crypto-fix_buffer_overflow.patch
Log Message:
add patch
python-crypto-fix_buffer_overflow.patch:
--- NEW FILE python-crypto-fix_buffer_overflow.patch ---
diff -Naur pycrypto-2.0.1.org/src/ARC2.c pycrypto-2.0.1/src/ARC2.c
--- pycrypto-2.0.1.org/src/ARC2.c 2009-02-13 17:08:30.000000000 +0100
+++ pycrypto-2.0.1/src/ARC2.c 2009-02-13 17:08:47.000000000 +0100
@@ -11,6 +11,7 @@
*/
#include <string.h>
+#include "Python.h"
#define MODULE_NAME ARC2
#define BLOCK_SIZE 8
@@ -146,6 +147,12 @@
We'll hardwire it to 1024. */
#define bits 1024
+ if ((U32)keylength > sizeof(self->xkey)) {
+ PyErr_SetString(PyExc_ValueError,
+ "ARC2 key length must be less than 128 bytes");
+ return;
+ }
+
memcpy(self->xkey, key, keylength);
/* Phase 1: Expand input key to 128 bytes */
- Previous message (by thread): rpms/ogre/devel .cvsignore, 1.16, 1.17 ogre.spec, 1.44, 1.45 sources, 1.17, 1.18
- Next message (by thread): rpms/diffutils/devel diffutils-sdiff-E.patch, NONE, 1.1 diffutils.spec, 1.27, 1.28
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-extras-commits
mailing list