dhcpcd: Update to version 10.0.4

- Update from version 10.0.2 to 10.0.4
- Update of rootfile not required
- Two patches removed as the fixes have been included in the source tarball
- Changelog
    10.0.4
	    privsep: allow __NR_mmap2 call by @olegartys in #253
	    privsep: allow __NR_clock_gettime32 syscall by @olegartys in #254
	    compat/arc4random.c: use memset instead of explicit_bzero by
	     @ffontaine in #252
	    privsep: avoid SIGPIPE errors when scripts write to stderr/stdout after
	     dhcpcd is daemonised
    10.0.3
	    Do not crash on dhcpcd test run by @pemensik in #231
	    Add automated CI builds for Ubuntu, OpenBSD, FreeBSD and NetBSD by
	     @tobhe in #229
	    dhcpcd: Fix off-by-one overflow when read() writes full BUFSIZ by
	     @tobhe in #236
	    privsep: fix strlcpy overflow in psp_ifname by @tobhe in #239
	    ci: execute tests after successful build by @tobhe in #243
	    compat: update arc4random() to newer chacha20 based version from OpenBSD by
	     @tobhe in #227
	    Support libcrypto for hmac and sha256 by @tobhe in #223
	    Use a local variable instead of the optind by @gotthardp in #86
	    Send correct amount of used buffer for prefix exclude option by
	     @ctomahogh in #250
	    compat: use OpenSSL RAND_priv_bytes() for entropy by @tobhe in #248

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
This commit is contained in:
Adolf Belka
2023-11-08 22:57:57 +01:00
committed by Peter Müller
parent fa92e618c1
commit 5197e7bc6a
3 changed files with 2 additions and 58 deletions

View File

@@ -1,26 +0,0 @@
From f798bf23af8e5a0eae38931912e2b67e1d45aca4 Mon Sep 17 00:00:00 2001
From: Tobias Heider <tobhe@users.noreply.github.com>
Date: Sat, 12 Aug 2023 21:59:21 +0200
Subject: [PATCH] dhcpcd: Fix off-by-one overflow when read() writes full
BUFSIZ (#236)
---
src/dhcpcd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/dhcpcd.c b/src/dhcpcd.c
index e06733d3..688a3a6d 100644
--- a/src/dhcpcd.c
+++ b/src/dhcpcd.c
@@ -1822,7 +1822,7 @@ dhcpcd_stderr_cb(void *arg, unsigned short events)
if (!(events & ELE_READ))
return;
- len = read(ctx->stderr_fd, log, sizeof(log));
+ len = read(ctx->stderr_fd, log, sizeof(log) - 1);
if (len == -1) {
if (errno != ECONNRESET)
logerr(__func__);
--
2.39.2

View File

@@ -1,28 +0,0 @@
From 1bd8fc7d4b34f752a32709d277a897e5ad202d97 Mon Sep 17 00:00:00 2001
From: Tobias Heider <tobhe@users.noreply.github.com>
Date: Tue, 15 Aug 2023 18:06:48 +0200
Subject: [PATCH] privsep: fix strlcpy overflow in psp_ifname (#239)
When running our Ubuntu tests with libc6 and strlcpy overflow checks
enabled we found that the wrong size is passed to strlcpy resulting
in a crash because of an overflow.
---
src/privsep.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/privsep.c b/src/privsep.c
index b11c0351..cfe54742 100644
--- a/src/privsep.c
+++ b/src/privsep.c
@@ -1200,7 +1200,7 @@ ps_newprocess(struct dhcpcd_ctx *ctx, struct ps_id *psid)
#endif
if (!(ctx->options & DHCPCD_MANAGER))
- strlcpy(psp->psp_ifname, ctx->ifv[0], sizeof(psp->psp_name));
+ strlcpy(psp->psp_ifname, ctx->ifv[0], sizeof(psp->psp_ifname));
TAILQ_INSERT_TAIL(&ctx->ps_processes, psp, next);
return psp;
}
--
2.39.2