From 3b7e18015812e122839bcbaf4aa3caaad6acb39f Mon Sep 17 00:00:00 2001 From: roam Date: Mon, 22 Oct 2001 02:03:10 +0000 Subject: Fix a format string vulnerability. Note that others might still be lurking inside the m4 code, this is just a quick fix for the one reported on BugTraq. (What do I think I am doing, anyway, reading BugTraq at 4:30am on a bleak Monday morning..) Reported by: via BugTraq --- devel/m4/Makefile | 1 + devel/m4/files/patch-ac | 20 ++++++++++++++++++++ 2 files changed, 21 insertions(+) create mode 100644 devel/m4/files/patch-ac (limited to 'devel/m4') diff --git a/devel/m4/Makefile b/devel/m4/Makefile index 464c3bba6b26..7cee4bc4ba78 100644 --- a/devel/m4/Makefile +++ b/devel/m4/Makefile @@ -7,6 +7,7 @@ PORTNAME= m4 PORTVERSION= 1.4 +PORTREVISION= 1 CATEGORIES= devel MASTER_SITES= ${MASTER_SITE_GNU} MASTER_SITE_SUBDIR= m4 diff --git a/devel/m4/files/patch-ac b/devel/m4/files/patch-ac new file mode 100644 index 000000000000..678532eaf19a --- /dev/null +++ b/devel/m4/files/patch-ac @@ -0,0 +1,20 @@ +--- src/m4.c Mon Oct 22 04:25:47 2001 ++++ src/m4.c Mon Oct 22 04:26:03 2001 +@@ -369,7 +369,7 @@ + + case 'o': + if (!debug_set_output (optarg)) +- error (0, errno, optarg); ++ error (0, errno, "%s", optarg); + break; + + case 's': +@@ -466,7 +466,7 @@ + fp = path_search (argv[optind]); + if (fp == NULL) + { +- error (0, errno, argv[optind]); ++ error (0, errno, "%s", argv[optind]); + continue; + } + else -- cgit