Linux cpanel.rrshost.in 5.15.0-25-generic #25-Ubuntu SMP Wed Mar 30 15:54:22 UTC 2022 x86_64
Apache
: 109.123.238.221 | : 172.70.127.108
128 Domain
8.2.28
aev999
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
src /
glibc /
debian /
patches /
any /
[ HOME SHELL ]
Name
Size
Permission
Action
CVE-2023-4806-pre1.patch
1.7
KB
-rw-r--r--
CVE-2023-4806-pre10.patch
5.45
KB
-rw-r--r--
CVE-2023-4806-pre11.patch
5.99
KB
-rw-r--r--
CVE-2023-4806-pre12.patch
1.31
KB
-rw-r--r--
CVE-2023-4806-pre2.patch
7.2
KB
-rw-r--r--
CVE-2023-4806-pre3.patch
2.93
KB
-rw-r--r--
CVE-2023-4806-pre4.patch
8.29
KB
-rw-r--r--
CVE-2023-4806-pre5.patch
31.86
KB
-rw-r--r--
CVE-2023-4806-pre6.patch
4.75
KB
-rw-r--r--
CVE-2023-4806-pre7.patch
9.25
KB
-rw-r--r--
CVE-2023-4806-pre8.patch
19.66
KB
-rw-r--r--
CVE-2023-4806-pre9.patch
5.16
KB
-rw-r--r--
CVE-2023-4806.patch
12.16
KB
-rw-r--r--
CVE-2023-4813.patch
25.4
KB
-rw-r--r--
CVE-2023-4911.patch
2
KB
-rw-r--r--
CVE-2023-5156.patch
3.19
KB
-rw-r--r--
CVE-2024-2961.patch
6.92
KB
-rw-r--r--
CVE-2025-0395.patch
2.16
KB
-rw-r--r--
CVE-2025-4802.patch
2.44
KB
-rw-r--r--
git-surplus-tls-accounting.dif...
40.23
KB
-rw-r--r--
local-asserth-decls.diff
1.13
KB
-rw-r--r--
local-bindresvport_blacklist.d...
3.31
KB
-rw-r--r--
local-bootstrap-headers.diff
3.17
KB
-rw-r--r--
local-disable-libnss-db.diff
478
B
-rw-r--r--
local-fhs-linux-paths.diff
1
KB
-rw-r--r--
local-fhs-nscd.diff
855
B
-rw-r--r--
local-ld-multiarch.diff
1.32
KB
-rw-r--r--
local-ldconfig-ignore-ld.so.di...
1.47
KB
-rw-r--r--
local-ldconfig-multiarch.diff
1.51
KB
-rw-r--r--
local-ldso-disable-hwcap.diff
3.71
KB
-rw-r--r--
local-nss-overflow.diff
1.93
KB
-rw-r--r--
local-nss-upgrade.diff
956
B
-rw-r--r--
local-revert-bz13979.diff
1.43
KB
-rw-r--r--
local-stubs_h.diff
432
B
-rw-r--r--
local-tcsetaddr.diff
2.83
KB
-rw-r--r--
local-test-install.diff
612
B
-rw-r--r--
submitted-bits-fcntl_h-at.diff
5.08
KB
-rw-r--r--
submitted-ld.so-cache-new-form...
2.27
KB
-rw-r--r--
submitted-missing-etc-hosts.di...
306
B
-rw-r--r--
submitted-nptl-invalid-td.patc...
883
B
-rw-r--r--
submitted-resolv-unaligned.dif...
3.04
KB
-rw-r--r--
unsubmitted-ldso-machine-misma...
444
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : local-tcsetaddr.diff
# All lines beginning with `# DP:' are a description of the patch. # DP: Description: tcsetattr sanity check on PARENB/CREAD/CSIZE for ptys # DP: Related bugs: 218131 # DP: Author: Jeff Licquia <licquia@progeny.com> # DP: Upstream status: [In CVS | Debian-Specific | Pending | Not submitted ] # DP: Status Details: # DP: Date: 2003-10-29 --- sysdeps/unix/sysv/linux/tcsetattr.c | 55 +++++++++++++++++++++++++++++++++++- 1 file changed, 54 insertions(+), 1 deletion(-) --- a/sysdeps/unix/sysv/linux/tcsetattr.c +++ b/sysdeps/unix/sysv/linux/tcsetattr.c @@ -44,7 +44,12 @@ __tcsetattr (int fd, int optional_actions, const struct termios *termios_p) { struct __kernel_termios k_termios; + struct __kernel_termios k_termios_old; unsigned long int cmd; + int retval, old_retval; + + /* Preserve the previous termios state if we can. */ + old_retval = INLINE_SYSCALL (ioctl, 3, fd, TCGETS, &k_termios_old); switch (optional_actions) { @@ -75,7 +80,55 @@ memcpy (&k_termios.c_cc[0], &termios_p->c_cc[0], __KERNEL_NCCS * sizeof (cc_t)); - return INLINE_SYSCALL (ioctl, 3, fd, cmd, &k_termios); + retval = INLINE_SYSCALL (ioctl, 3, fd, cmd, &k_termios); + + /* The Linux kernel silently ignores the invalid c_cflag on pty. + We have to check it here, and return an error. But if some other + setting was successfully changed, POSIX requires us to report + success. */ + if ((retval == 0) && (old_retval == 0)) + { + int save = errno; + retval = INLINE_SYSCALL (ioctl, 3, fd, TCGETS, &k_termios); + if (retval) + { + /* We cannot verify if the setting is ok. We don't return + an error (?). */ + __set_errno (save); + retval = 0; + } + else if ((k_termios_old.c_oflag != k_termios.c_oflag) || + (k_termios_old.c_lflag != k_termios.c_lflag) || + (k_termios_old.c_line != k_termios.c_line) || + ((k_termios_old.c_iflag | IBAUD0) != (k_termios.c_iflag | IBAUD0))) + { + /* Some other setting was successfully changed, which + means we should not return an error. */ + __set_errno (save); + retval = 0; + } + else if ((k_termios_old.c_cflag | (PARENB & CREAD & CSIZE)) != + (k_termios.c_cflag | (PARENB & CREAD & CSIZE))) + { + /* Some other c_cflag setting was successfully changed, which + means we should not return an error. */ + __set_errno (save); + retval = 0; + } + else if ((termios_p->c_cflag & (PARENB | CREAD)) + != (k_termios.c_cflag & (PARENB | CREAD)) + || ((termios_p->c_cflag & CSIZE) + && (termios_p->c_cflag & CSIZE) + != (k_termios.c_cflag & CSIZE))) + { + /* It looks like the Linux kernel silently changed the + PARENB/CREAD/CSIZE bits in c_cflag. Report it as an + error. */ + __set_errno (EINVAL); + retval = -1; + } + } + return retval; } weak_alias (__tcsetattr, tcsetattr) libc_hidden_def (tcsetattr)
Close