aboutsummaryrefslogtreecommitdiff
path: root/gnu/packages/patches/icecat-CVE-2015-7213-pt1.patch
diff options
context:
space:
mode:
authorMark H Weaver <mhw@netris.org>2015-12-23 10:46:23 -0500
committerMark H Weaver <mhw@netris.org>2015-12-23 18:19:59 -0500
commit097190417f7eadbb02370970acfe8b05da4a619d (patch)
treeefb056bb5ce12e9b032cf472cd20ce6eafad9e4b /gnu/packages/patches/icecat-CVE-2015-7213-pt1.patch
parentbba5de0e43e9820fae1442c4ce893c10cb945674 (diff)
downloadguix-097190417f7eadbb02370970acfe8b05da4a619d.tar.gz
guix-097190417f7eadbb02370970acfe8b05da4a619d.zip
gnu: icecat: Update to 38.5.0-gnu1.
* gnu/packages/patches/icecat-CVE-2015-7201-pt1.patch, gnu/packages/patches/icecat-CVE-2015-7201-pt2.patch, gnu/packages/patches/icecat-CVE-2015-7201-pt3.patch, gnu/packages/patches/icecat-CVE-2015-7205.patch, gnu/packages/patches/icecat-CVE-2015-7210.patch, gnu/packages/patches/icecat-CVE-2015-7212.patch, gnu/packages/patches/icecat-CVE-2015-7213-pt1.patch, gnu/packages/patches/icecat-CVE-2015-7213-pt2.patch, gnu/packages/patches/icecat-CVE-2015-7214.patch, gnu/packages/patches/icecat-CVE-2015-7222-pt1.patch, gnu/packages/patches/icecat-CVE-2015-7222-pt2.patch, gnu/packages/patches/icecat-CVE-2015-7222-pt3.patch, gnu/packages/patches/icecat-freetype-2.6.patch: Delete files. * gnu-system.am (dist_patch_DATA): Remove them. * gnu/packages/gnuzilla.scm (icecat): Update to 38.5.0-gnu1. [source]: Remove patches.
Diffstat (limited to 'gnu/packages/patches/icecat-CVE-2015-7213-pt1.patch')
-rw-r--r--gnu/packages/patches/icecat-CVE-2015-7213-pt1.patch32
1 files changed, 0 insertions, 32 deletions
diff --git a/gnu/packages/patches/icecat-CVE-2015-7213-pt1.patch b/gnu/packages/patches/icecat-CVE-2015-7213-pt1.patch
deleted file mode 100644
index 854c91b8aa..0000000000
--- a/gnu/packages/patches/icecat-CVE-2015-7213-pt1.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-From 3f31bf9e243fb3de26e36d6be0bb0153f51c5b2a Mon Sep 17 00:00:00 2001
-From: Jean-Yves Avenard <jyavenard@mozilla.com>
-Date: Wed, 9 Dec 2015 09:54:58 +0100
-Subject: [PATCH] Bug 1206211 - P1. Ensure operation can't overflow.
- r=kentuckyfriedtakahe, a=sylvestre
-
----
- .../frameworks/av/media/libstagefright/MPEG4Extractor.cpp | 5 ++++-
- 1 file changed, 4 insertions(+), 1 deletion(-)
-
-diff --git a/media/libstagefright/frameworks/av/media/libstagefright/MPEG4Extractor.cpp b/media/libstagefright/frameworks/av/media/libstagefright/MPEG4Extractor.cpp
-index 22163fa..318152a 100644
---- a/media/libstagefright/frameworks/av/media/libstagefright/MPEG4Extractor.cpp
-+++ b/media/libstagefright/frameworks/av/media/libstagefright/MPEG4Extractor.cpp
-@@ -508,10 +508,13 @@ status_t MPEG4Extractor::readMetaData() {
- CHECK_NE(err, (status_t)NO_INIT);
-
- // copy pssh data into file metadata
-- int psshsize = 0;
-+ uint64_t psshsize = 0;
- for (size_t i = 0; i < mPssh.size(); i++) {
- psshsize += 20 + mPssh[i].datalen;
- }
-+ if (psshsize > kMAX_ALLOCATION) {
-+ return ERROR_MALFORMED;
-+ }
- if (psshsize) {
- char *buf = (char*)malloc(psshsize);
- char *ptr = buf;
---
-2.6.3
-