cyrus-sasl: patch CVE-2019-19906
authorMichal Vasilek <michal.vasilek@nic.cz>
Fri, 12 Nov 2021 17:09:39 +0000 (18:09 +0100)
committerNick Hainke <vincent@systemli.org>
Sat, 13 Nov 2021 07:00:35 +0000 (08:00 +0100)
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
libs/cyrus-sasl/patches/CVE-2019-19906.patch [new file with mode: 0644]

diff --git a/libs/cyrus-sasl/patches/CVE-2019-19906.patch b/libs/cyrus-sasl/patches/CVE-2019-19906.patch
new file mode 100644 (file)
index 0000000..1b9fdfa
--- /dev/null
@@ -0,0 +1,23 @@
+From dcc9f51cbd4ed622cfb0f9b1c141eb2ffe3b12f1 Mon Sep 17 00:00:00 2001
+From: Quanah Gibson-Mount <quanah@symas.com>
+Date: Tue, 18 Feb 2020 19:05:12 +0000
+Subject: [PATCH] Fix #587
+
+Off by one error in common.c, CVE-2019-19906.
+
+Thanks to Stephan Zeisberg for reporting
+---
+ lib/common.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/lib/common.c
++++ b/lib/common.c
+@@ -190,7 +190,7 @@ int _sasl_add_string(char **out, size_t
+   if (add==NULL) add = "(null)";
+-  addlen=strlen(add); /* only compute once */
++  addlen=strlen(add)+1; /* only compute once */
+   if (_buf_alloc(out, alloclen, (*outlen)+addlen)!=SASL_OK)
+     return SASL_NOMEM;