Fixes CVE-2014-3618 (heap overflow in formisc.c allowing denial of service and potential remote execution of arbitrary code). https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618 Source: http://seclists.org/oss-sec/2014/q3/495 Adopted by Debian as patch '27': https://sources.debian.net/src/procmail/3.22-25/debian/patches/27/ --- a/src/formisc.c +++ b/src/formisc.c @@ -84,12 +84,11 @@ case '"':*target++=delim='"';start++; } ;{ int i; - do + while(*start) if((i= *target++= *start++)==delim) /* corresponding delimiter? */ break; else if(i=='\\'&&*start) /* skip quoted character */ *target++= *start++; - while(*start); /* anything? */ } hitspc=2; } lect name='h' onchange='this.form.submit();'> Wojtek's customized Guix
aboutsummaryrefslogtreecommitdiff
path: root/tests/guix-graph.sh
AgeCommit message (Collapse)Author
2016-05-21graph: Allow store file names for 'derivation' and 'references' graphs.Ludovic Courtès
* guix/scripts/graph.scm (%derivation-node-type)[convert]: Add 'derivation-path?' and catch-all clauses. (%reference-node-type)[convert]: Add 'store-path?' and catch-all clauses. (assert-package, nodes-from-package): New procedures. (%package-node-type, %bag-node-type,%bag-with-origins-node-type) (%bag-emerged-node-type): Add 'convert' field (guix-graph): Rename 'packages' to 'items' and allow 'store-path?' arguments. * guix/graph.scm (<node-type>)[convert]: Adjust comment. * doc/guix.texi (Invoking guix graph): Document it.