aboutsummaryrefslogtreecommitdiffstats
path: root/audio/esound
diff options
context:
space:
mode:
authorvanilla <vanilla@FreeBSD.org>2000-09-23 16:21:22 +0800
committervanilla <vanilla@FreeBSD.org>2000-09-23 16:21:22 +0800
commit0ccad555c059ef3ff0d675635b97862155ab7dca (patch)
tree2beaa530d4df8fd48bec7c9ecf437548732f11ea /audio/esound
parentffc709f03e2dca0019338f7e4adf6917e19dbf95 (diff)
downloadfreebsd-ports-graphics-0ccad555c059ef3ff0d675635b97862155ab7dca.tar.gz
freebsd-ports-graphics-0ccad555c059ef3ff0d675635b97862155ab7dca.tar.zst
freebsd-ports-graphics-0ccad555c059ef3ff0d675635b97862155ab7dca.zip
Add a patch that fixes the vulnerability.
Submitted by: ade
Diffstat (limited to 'audio/esound')
-rw-r--r--audio/esound/files/patch-ac19
1 files changed, 9 insertions, 10 deletions
diff --git a/audio/esound/files/patch-ac b/audio/esound/files/patch-ac
index f493138a02a..b26759a4683 100644
--- a/audio/esound/files/patch-ac
+++ b/audio/esound/files/patch-ac
@@ -1,23 +1,22 @@
---- esd.c.orig Tue Apr 4 11:20:08 2000
-+++ esd.c Thu Jun 29 23:34:18 2000
-@@ -219,12 +219,12 @@
+--- esd.c.orig Tue Apr 4 23:20:08 2000
++++ esd.c Sat Sep 23 16:13:26 2000
+@@ -218,13 +218,9 @@
+ if (access(ESD_UNIX_SOCKET_DIR, R_OK | W_OK) == -1)
{
mkdir(ESD_UNIX_SOCKET_DIR,
- S_IRUSR|S_IWUSR|S_IXUSR|
+- S_IRUSR|S_IWUSR|S_IXUSR|
- S_IRGRP|S_IWGRP|S_IXGRP|
- S_IROTH|S_IWOTH|S_IXOTH);
-+ S_IRGRP|S_IXGRP|
-+ S_IROTH|S_IXOTH);
++ S_IRUSR|S_IWUSR|S_IXUSR);
chmod(ESD_UNIX_SOCKET_DIR,
- S_IRUSR|S_IWUSR|S_IXUSR|
+- S_IRUSR|S_IWUSR|S_IXUSR|
- S_IRGRP|S_IWGRP|S_IXGRP|
- S_IROTH|S_IWOTH|S_IXOTH);
-+ S_IRGRP|S_IXGRP|
-+ S_IROTH|S_IXOTH);
++ S_IRUSR|S_IWUSR|S_IXUSR);
}
if (access(ESD_UNIX_SOCKET_NAME, R_OK | W_OK) == -1)
{
-@@ -317,9 +317,9 @@
+@@ -317,9 +313,9 @@
/* let anyone access esd's socket - but we have authentication so they */
/* wont get far if they dont have the auth key */
chmod(ESD_UNIX_SOCKET_NAME,