openbsd-ports/devel/libgtop/patches/patch-sysdeps_freebsd_prockernel_c
todd 8d82e7ea1c Security update for libgtop to libgtop-1.0.13:
The Laboratory intexxia found a remote exploitable format string
vulnerability in libgtop_daemon which could cause privilege escalation
on a remote system.

The libgtop_daemon is not running by default if you run GNOME.

New since last version:

- security fix
- update for parallel install with libgtop-2.0
+ Only install shared libraries on shared arches.

From maintainer (Nils Nordman <nino@nforced.com>).
2001-11-27 23:07:01 +00:00

35 lines
1.0 KiB
Plaintext

$OpenBSD: patch-sysdeps_freebsd_prockernel_c,v 1.2 2001/11/27 23:07:02 todd Exp $
--- sysdeps/freebsd/prockernel.c.orig Fri Sep 28 20:14:49 2001
+++ sysdeps/freebsd/prockernel.c Fri Sep 28 20:38:18 2001
@@ -68,7 +68,9 @@ void
glibtop_init_proc_kernel_p (glibtop *server)
{
server->sysdeps.proc_kernel = _glibtop_sysdeps_proc_kernel_pstats |
+#if (!defined __OpenBSD__) || (defined __i386__)
_glibtop_sysdeps_proc_kernel_pcb |
+#endif
_glibtop_sysdeps_proc_kernel_wchan;
}
@@ -167,14 +169,20 @@ glibtop_get_proc_kernel_p (glibtop *serv
/*xxx FreeBSD/Alpha? */
#endif
#else
+#if (!defined __OpenBSD__) || (defined __i386__)
buf->kstk_esp = (u_int64_t) pcb.pcb_tss.tss_esp0;
+#endif
#ifdef __bsdi__
buf->kstk_eip = (u_int64_t) pcb.pcb_tss.tss_eip;
#else
+#if (!defined __OpenBSD__) || (defined __i386__)
buf->kstk_eip = (u_int64_t) pcb.pcb_tss.__tss_eip;
+#endif
#endif
+#if (!defined __OpenBSD__) || (defined __i386__)
buf->flags |= _glibtop_sysdeps_proc_kernel_pcb;
+#endif
#endif
}