hdf5/hdf5-Remove-timestamps-from-binaries.patch

39 lines
1.4 KiB
Diff
Raw Normal View History

From: Egbert Eich <eich@suse.com>
Date: Sat Nov 17 18:15:13 2018 +0100
Subject: hdf5: Remove timestamps from binaries
Patch-mainline: never
Git-commit: 3b88045491c0b43f385edce47e3aae07660cd9f3
References:
Signed-off-by: Egbert Eich <eich@suse.com>
Signed-off-by: Egbert Eich <eich@suse.de>
---
src/H5detect.c | 15 ---------------
1 file changed, 15 deletions(-)
Accepting request 848496 from home:anag:branches:science - Update to version 1.10.7 * https://support.hdfgroup.org/ftp/HDF5/releases/hdf5-1.10/hdf5-1.10.6/src/hdf5-1.10.6-RELEASE.txt * https://support.hdfgroup.org/ftp/HDF5/releases/hdf5-1.10/hdf5-1.10.7/src/hdf5-1.10.7-RELEASE.txt - Security bugs fixed: * CVE-2018-13870: heap-based buffer over-read in the function H5O_link_decode in H5Olink.c (bsc#1101493) * CVE-2018-13869: memcpy parameter overlap in the function H5O_link_decode in H5Olink.c (bsc#1101495) * CVE-2018-17438: A SIGFPE signal is raised in the function H5D__select_io() of H5Dselect.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division (bsc#1109570) * CVE-2018-17435: A heap-based buffer over-read in H5O_attr_decode() in H5Oattr.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service via a crafted HDF5 file. (bsc#1109567) - Refresh patches - Security bugs fixed: * CVE-2018-17233: A SIGFPE signal is raised in the function H5D__create_chunk_file_map_hyper. (bsc#1109166) * CVE-2018-17434: Memory leak in the H5O__chunk_deserialize() function in H5Ocache.c (bsc#1109167) * CVE-2018-17437: A SIGFPE signal is raised in the function H5D__chunk_set_info_real. (bsc#1109168) - Security bugs fixed: * CVE-2017-17505: NULL pointer dereference in the function H5O_pline_decode allowing for DoS via crafted file (bsc#1072087) * CVE-2017-17506: Out of bounds read in the function OBS-URL: https://build.opensuse.org/request/show/848496 OBS-URL: https://build.opensuse.org/package/show/science/hdf5?expand=0&rev=139
2020-11-14 11:11:35 +00:00
Index: hdf5-1.10.7/src/H5detect.c
===================================================================
Accepting request 848496 from home:anag:branches:science - Update to version 1.10.7 * https://support.hdfgroup.org/ftp/HDF5/releases/hdf5-1.10/hdf5-1.10.6/src/hdf5-1.10.6-RELEASE.txt * https://support.hdfgroup.org/ftp/HDF5/releases/hdf5-1.10/hdf5-1.10.7/src/hdf5-1.10.7-RELEASE.txt - Security bugs fixed: * CVE-2018-13870: heap-based buffer over-read in the function H5O_link_decode in H5Olink.c (bsc#1101493) * CVE-2018-13869: memcpy parameter overlap in the function H5O_link_decode in H5Olink.c (bsc#1101495) * CVE-2018-17438: A SIGFPE signal is raised in the function H5D__select_io() of H5Dselect.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division (bsc#1109570) * CVE-2018-17435: A heap-based buffer over-read in H5O_attr_decode() in H5Oattr.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service via a crafted HDF5 file. (bsc#1109567) - Refresh patches - Security bugs fixed: * CVE-2018-17233: A SIGFPE signal is raised in the function H5D__create_chunk_file_map_hyper. (bsc#1109166) * CVE-2018-17434: Memory leak in the H5O__chunk_deserialize() function in H5Ocache.c (bsc#1109167) * CVE-2018-17437: A SIGFPE signal is raised in the function H5D__chunk_set_info_real. (bsc#1109168) - Security bugs fixed: * CVE-2017-17505: NULL pointer dereference in the function H5O_pline_decode allowing for DoS via crafted file (bsc#1072087) * CVE-2017-17506: Out of bounds read in the function OBS-URL: https://build.opensuse.org/request/show/848496 OBS-URL: https://build.opensuse.org/package/show/science/hdf5?expand=0&rev=139
2020-11-14 11:11:35 +00:00
--- hdf5-1.10.7.orig/src/H5detect.c
+++ hdf5-1.10.7/src/H5detect.c
@@ -1234,21 +1234,6 @@ bit.\n";
fprintf(rawoutstream, "/* Generated automatically by H5detect -- do not edit */\n\n\n");
HDfputs(FileHeader, rawoutstream); /*the copyright notice--see top of this file */
- fprintf(rawoutstream, " *\n * Created:\t\t%s %2d, %4d\n",
- month_name[tm->tm_mon], tm->tm_mday, 1900 + tm->tm_year);
- if(pwd || real_name[0] || host_name[0]) {
- fprintf(rawoutstream, " *\t\t\t");
- if(real_name[0])
- fprintf(rawoutstream, "%s <", real_name);
-#ifdef H5_HAVE_GETPWUID
- if(pwd) HDfputs(pwd->pw_name, rawoutstream);
-#endif
- if(host_name[0])
- fprintf(rawoutstream, "@%s", host_name);
- if(real_name[0])
- fprintf(rawoutstream, ">");
- HDfputc('\n', rawoutstream);
- }
fprintf(rawoutstream, " *\n * Purpose:\t\t");
for(s = purpose; *s; s++) {
HDfputc(*s, rawoutstream);