Package: libnl3 / 3.2.27-2
Metadata
Package | Version | Patches format |
---|---|---|
libnl3 | 3.2.27-2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
debian/etc libnl 3.diff p1 | (download) |
Makefile.am |
2 1 + 1 - 0 ! |
[patch] install into etc/libnl-3 Prevent naming conflicts with libnl2 or later conffiles. Signed-off-by: Heiko Stuebner <heiko@sntech.de> |
debian/out of tree.diff p1 | (download) |
lib/Makefile.am |
4 4 + 0 - 0 ! |
[patch] enable out of tree build This also includes a backported gen-tags.sh to fix build-failures. Signed-off-by: Heiko Stuebner <heiko@sntech.de> |
debian/no symvers.diff p1 | (download) |
lib/Makefile.am |
22 8 + 14 - 0 ! |
[patch] disable symbol versioning libnl3 after 3.2.21 enabled symbol versioning [0] without increasing the soname of the library, producing issues with our symbol lists. Until we hit a regular soname bump, it might be easiest to keep symbol versioning disabled. [0] https://github.com/thom311/libnl/commit/0eb665c693ab2673b722ffd75df744f75fb7e2fe |
debian/__nl_cache_ops_lookup unstatic.diff p1 | (download) |
lib/cache_mngt.c |
2 1 + 1 - 0 ! |
[patch] revert "cache_mngt: make __nl_cache_ops_lookup() static, it was never declared" This reverts commit 5329f6a6c792fc444e90e928f3b0ccec303f201a. |
debian/_nl_socket_generate_local_port_no_release.diff p1 | (download) |
lib/socket.c |
5 5 + 0 - 0 ! |
[patch] add _nl_socket_set_local_port_no_release stub libnl commit eaa75b7c7d3e ("socket: fix assertion in nl_connect() when all ports are already in use") removed _nl_socket_generate_local_port_no_release in favor of a more flexible variant. Readd a stub function to make our symbols happy |
debian/nlmsg_reserve overflow.patch p1 | (download) |
lib/msg.c |
3 3 + 0 - 0 ! |
[patch] lib: check for integer-overflow in nlmsg_reserve() In general, libnl functions are not robust against calling with invalid arguments. Thus, never call libnl functions with invalid arguments. In case of nlmsg_reserve() this means never provide a @len argument that causes overflow. Still, add an additional safeguard to avoid exploiting such bugs. Assume that @pad is a trusted, small integer. Assume that n->nm_size is a valid number of allocated bytes (and thus much smaller then SIZE_T_MAX). Assume, that @len may be set to an untrusted value. Then the patch avoids an integer overflow resulting in reserving too few bytes. |