FreeBSD Bugzilla – Attachment 49119 Details for
Bug 75104
[PATCH] devel/cscope: security fix CAN-2004-0996
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
cscope-15.5_1.patch
cscope-15.5_1.patch (text/plain), 2.25 KB, created by
Matthias Andree
on 2004-12-15 12:10:27 UTC
(
hide
)
Description:
cscope-15.5_1.patch
Filename:
MIME Type:
Creator:
Matthias Andree
Created:
2004-12-15 12:10:27 UTC
Size:
2.25 KB
patch
obsolete
>diff -ruN --exclude=CVS /usr/ports/devel/cscope/Makefile /root/ports/devel/cscope/Makefile >--- /usr/ports/devel/cscope/Makefile Wed Oct 29 12:42:25 2003 >+++ /root/ports/devel/cscope/Makefile Wed Dec 15 12:42:17 2004 >@@ -8,6 +8,7 @@ > > PORTNAME= cscope > PORTVERSION= 15.5 >+PORTREVISION= 1 > CATEGORIES= devel > MASTER_SITES= ${MASTER_SITE_SOURCEFORGE} > MASTER_SITE_SUBDIR= ${PORTNAME} >diff -ruN --exclude=CVS /usr/ports/devel/cscope/files/patch-ac /root/ports/devel/cscope/files/patch-ac >--- /usr/ports/devel/cscope/files/patch-ac Thu Jan 1 01:00:00 1970 >+++ /root/ports/devel/cscope/files/patch-ac Wed Dec 15 12:45:20 2004 >@@ -0,0 +1,52 @@ >+=================================================================== >+RCS file: /cvsroot/cscope/cscope/src/main.c,v >+retrieving revision 1.33 >+retrieving revision 1.34 >+diff -u -r1.33 -r1.34 >+--- src/main.c 2004/04/30 15:31:43 1.33 >++++ src/main.c 2004/12/06 14:56:43 1.34 >+@@ -101,6 +101,7 @@ >+ #endif >+ char temp1[PATHLEN + 1]; /* temporary file name */ >+ char temp2[PATHLEN + 1]; /* temporary file name */ >++char tempdirpv[PATHLEN +1]; /* private temp directory */ >+ long totalterms; /* total inverted index terms */ >+ BOOL trun_syms; /* truncate symbols to 8 characters */ >+ char tempstring[8192]; /* use this as a buffer, instead of 'yytext', >+@@ -131,6 +132,7 @@ >+ int c, i; >+ pid_t pid; >+ struct stat stat_buf; >++ mode_t orig_umask; >+ >+ yyin = stdin; >+ yyout = stdout; >+@@ -330,9 +332,18 @@ >+ } >+ >+ /* create the temporary file names */ >++ orig_umask = umask(S_IRWXG|S_IRWXO); >+ pid = getpid(); >+- (void) sprintf(temp1, "%s/cscope%d.1", tmpdir, pid); >+- (void) sprintf(temp2, "%s/cscope%d.2", tmpdir, pid); >++ (void) sprintf(tempdirpv, "%s/cscope.%d", tmpdir, pid); >++ if(mkdir(tempdirpv,S_IRWXU)) >++ { >++ fprintf(stderr, "cscope: Could not create private temp dir %s\n",tempdirpv); >++ myexit(1); >++ } >++ umask(orig_umask); >++ >++ (void) sprintf(temp1, "%s/cscope.1", tempdirpv, pid); >++ (void) sprintf(temp2, "%s/cscope.2", tempdirpv, pid); >+ >+ /* if running in the foreground */ >+ if (signal(SIGINT, SIG_IGN) != SIG_IGN) { >+@@ -834,6 +845,7 @@ >+ if (temp1[0] != '\0') { >+ (void) unlink(temp1); >+ (void) unlink(temp2); >++ (void) rmdir(tempdirpv); >+ } >+ /* restore the terminal to its original mode */ >+ if (incurses == YES) {
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 75104
: 49119