slackware-current/source/a/file/upstream.mute-debug-warning.patch
Patrick J Volkerding 4ad66992c6 Thu Mar 16 23:34:56 UTC 2023
a/cracklib-2.9.10-x86_64-1.txz:  Upgraded.
a/file-5.44-x86_64-2.txz:  Rebuilt.
  Patched to mute debug messages. Thanks to Stuart Winter.
n/bind-9.18.13-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
n/openssh-9.3p1-x86_64-1.txz:  Upgraded.
  This release contains fixes for a security problem and a memory
  safety problem. The memory safety problem is not believed to be
  exploitable, but we report most network-reachable memory faults as
  security bugs.
  For more information, see:
    https://www.openssh.com/txt/release-9.3
  (* Security fix *)
n/php-8.2.4-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
xap/mozilla-thunderbird-102.9.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/102.9.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-10
    https://www.cve.org/CVERecord?id=CVE-2023-25751
    https://www.cve.org/CVERecord?id=CVE-2023-28164
    https://www.cve.org/CVERecord?id=CVE-2023-28162
    https://www.cve.org/CVERecord?id=CVE-2023-25752
    https://www.cve.org/CVERecord?id=CVE-2023-28163
    https://www.cve.org/CVERecord?id=CVE-2023-28176
  (* Security fix *)
2023-03-17 02:35:17 +01:00

27 lines
854 B
Diff

http://deb.debian.org/debian/pool/main/f/file/file_5.44-3.debian.tar.xz
Subject: Disable debug messages
Author: Christoph Biedl <debian.axhn@manchmal.in-ulm.de>
Date: 2022-12-20
Forwarded: https://mailman.astron.com/pipermail/file/2022-December/001018.html
--- a/src/softmagic.c
+++ b/src/softmagic.c
@@ -1461,7 +1461,7 @@
// On purpose not INTMAX_MAX
if (lhs >= UINT_MAX || lhs <= INT_MIN ||
off >= UINT_MAX || off <= INT_MIN) {
- fprintf(stderr, "lhs/off overflow %jd %jd\n", lhs, off);
+/* fprintf(stderr, "lhs/off overflow %jd %jd\n", lhs, off); */
return 1;
}
@@ -1497,7 +1497,7 @@
if (m->in_op & FILE_OPINVERSE)
offset = ~offset;
if (offset >= UINT_MAX) {
- fprintf(stderr, "offset overflow %jd\n", offset);
+/* fprintf(stderr, "offset overflow %jd\n", offset); */
return 1;
}
*rv = CAST(uint32_t, offset);