Sanitize patch format

Regenerate the patches using  --no-signature  --zero-commit
--no-numbered as it makes it easier to regenerate exactly the same
patches on a different setup.
This commit is contained in:
Christophe Fergeau 2017-02-06 18:47:30 +01:00
parent d919d639ae
commit 044d25bcda
3 changed files with 7 additions and 16 deletions

View File

@ -1,7 +1,7 @@
From ec124b982abcd23364963ffcd4c370b1ec962fc9 Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Frediano Ziglio <fziglio@redhat.com> From: Frediano Ziglio <fziglio@redhat.com>
Date: Tue, 13 Dec 2016 14:39:48 +0000 Date: Tue, 13 Dec 2016 14:39:48 +0000
Subject: [spice-server 1/3] Prevent possible DoS attempts during protocol Subject: [spice-server] Prevent possible DoS attempts during protocol
handshake handshake
The limit for link message is specified using a 32 bit unsigned integer. The limit for link message is specified using a 32 bit unsigned integer.
@ -54,6 +54,3 @@ index 8ef4efe..e7ebc43 100644
reds_send_link_error(link, SPICE_LINK_ERR_INVALID_DATA); reds_send_link_error(link, SPICE_LINK_ERR_INVALID_DATA);
spice_warning("bad size %u", header->size); spice_warning("bad size %u", header->size);
reds_link_free(link); reds_link_free(link);
--
2.9.3

View File

@ -1,7 +1,7 @@
From e16eee1d8be00b186437bf61e4e1871cd8d0211a Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Frediano Ziglio <fziglio@redhat.com> From: Frediano Ziglio <fziglio@redhat.com>
Date: Tue, 13 Dec 2016 14:40:10 +0000 Date: Tue, 13 Dec 2016 14:40:10 +0000
Subject: [spice-server 2/3] Prevent integer overflows in capability checks Subject: [spice-server] Prevent integer overflows in capability checks
The limits for capabilities are specified using 32 bit unsigned integers. The limits for capabilities are specified using 32 bit unsigned integers.
This could cause possible integer overflows causing buffer overflows. This could cause possible integer overflows causing buffer overflows.
@ -36,6 +36,3 @@ index e7ebc43..953a95a 100644
num_caps = link_mess->num_common_caps + link_mess->num_channel_caps; num_caps = link_mess->num_common_caps + link_mess->num_channel_caps;
caps = (uint32_t *)((uint8_t *)link_mess + link_mess->caps_offset); caps = (uint32_t *)((uint8_t *)link_mess + link_mess->caps_offset);
--
2.9.3

View File

@ -1,8 +1,8 @@
From 1d3e26c0ee75712fa4bbbcfa09d8d5866b66c8af Mon Sep 17 00:00:00 2001 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Frediano Ziglio <fziglio@redhat.com> From: Frediano Ziglio <fziglio@redhat.com>
Date: Tue, 29 Nov 2016 16:46:56 +0000 Date: Tue, 29 Nov 2016 16:46:56 +0000
Subject: [spice-server 3/3] main-channel: Prevent overflow reading messages Subject: [spice-server] main-channel: Prevent overflow reading messages from
from client client
Caller is supposed the function return a buffer able to store Caller is supposed the function return a buffer able to store
size bytes. size bytes.
@ -27,6 +27,3 @@ index 24dd448..1124506 100644
} else { } else {
return main_chan->recv_buf; return main_chan->recv_buf;
} }
--
2.9.3