Displaying 5 results from an estimated 5 matches for "src_copy".
Did you mean:
mic_copy
2009 Feb 04
2
lua assist
...milleune at inertia:~/syslinux-lua-stappers/com32/lua
| $ ls
| assist patches README.syslinux
| milleune at inertia:~/syslinux-lua-stappers/com32/lua
| $ assist/get
| milleune at inertia:~/syslinux-lua-stappers/com32/lua
| $ ls
| assist doc HISTORY lua-5.1.3.tar.gz patches README.syslinux src_copy
| COPYRIGHT etc INSTALL Makefile README src test
| milleune at inertia:~/syslinux-lua-stappers/com32/lua
| $ diff src_copy/ src/
| milleune at inertia:~/syslinux-lua-stappers/com32/lua
| $ assist/patch
| milleune at inertia:~/syslinux-lua-stappers/com32/lua
| $ diff src_copy/ src/ |...
2019 Jan 19
2
Status of SCP vulnerability
Hello,
I would like to request an update of the progress regarding fixes for the recently disclosed SCP vulnerability (CVE-2018-20685, CVE-2019-6111, CVE-2019-6109, CVE-2019-6110)
It has been stated that CVE-2018-20685 has been patched in november but there are currently no information available on the progress of patches regarding the other CVEs.
Will there be a patched release any time soon?
2010 Jul 29
1
[Bug] check return of kmalloc()
...fs/btrfs/tree-log.c 2010-07-06 16:45:48.000000000 +0400
+++ /tmp/cocci-output-7783-8f7d1b-tree-log.c 2010-07-28 18:43:08.000000000 +0400
@@ -336,8 +336,6 @@ static noinline int overwrite_item(struc
btrfs_release_path(root, path);
return 0;
}
- dst_copy = kmalloc(item_size, GFP_NOFS);
- src_copy = kmalloc(item_size, GFP_NOFS);
read_extent_buffer(eb, src_copy, src_ptr, item_size);
@@ -664,7 +662,6 @@ static noinline int drop_one_dir_item(st
btrfs_dir_item_key_to_cpu(leaf, di, &location);
name_len = btrfs_dir_name_len(leaf, di);
- name = kmalloc(name_len, GFP_NOFS);
read_e...
2019 Feb 08
12
[Bug 2966] New: scp rev 1.202 fix doesn't quite hit the mark
...the requested filename contains no / characters, e.g.
scp remote:'[xyz]*' .
or even
scp remote:safefile .
no check is done; the remote is permitted to send any file name
(hence overwrite any file) it likes. The trouble is that the
new code does
if ((restrict_pattern = strrchr(src_copy, '/')) != NULL) {
*restrict_pattern++ = '\0';
}
then, later,
if (restrict_pattern != NULL &&
fnmatch(restrict_pattern, cp, 0) != 0)
SCREWUP("filename does not match request");
If there is no /, strrchr r...
2019 Feb 08
12
[Bug 2966] New: scp rev 1.202 fix doesn't quite hit the mark
...the requested filename contains no / characters, e.g.
scp remote:'[xyz]*' .
or even
scp remote:safefile .
no check is done; the remote is permitted to send any file name
(hence overwrite any file) it likes. The trouble is that the
new code does
if ((restrict_pattern = strrchr(src_copy, '/')) != NULL) {
*restrict_pattern++ = '\0';
}
then, later,
if (restrict_pattern != NULL &&
fnmatch(restrict_pattern, cp, 0) != 0)
SCREWUP("filename does not match request");
If there is no /, strrchr r...