diff options
author | Remi Collet <remi@remirepo.net> | 2022-06-26 17:42:09 +0200 |
---|---|---|
committer | Remi Collet <remi@php.net> | 2022-06-26 17:42:09 +0200 |
commit | 20e61c0a1471086c99fd346cfd200b865b30bf57 (patch) | |
tree | 629172d26f48a80e34e3b06866f7db5c19d2a2d2 /0014-libssh2-1.4.3-scp-remote-exec.patch | |
parent | 6c2df6054475dd31fa2ce3f5ebeef77bc4537f4a (diff) |
update to 1.10.0
Diffstat (limited to '0014-libssh2-1.4.3-scp-remote-exec.patch')
-rw-r--r-- | 0014-libssh2-1.4.3-scp-remote-exec.patch | 48 |
1 files changed, 0 insertions, 48 deletions
diff --git a/0014-libssh2-1.4.3-scp-remote-exec.patch b/0014-libssh2-1.4.3-scp-remote-exec.patch deleted file mode 100644 index 971a7c9..0000000 --- a/0014-libssh2-1.4.3-scp-remote-exec.patch +++ /dev/null @@ -1,48 +0,0 @@ -From 9506e299fa5116aa8c4c626e6de1feaed9ff9ff8 Mon Sep 17 00:00:00 2001 -From: Kamil Dudka <kdudka@redhat.com> -Date: Mon, 11 Sep 2017 21:13:45 +0200 -Subject: [PATCH] scp: do not NUL-terminate the command for remote exec (#208) - -It breaks SCP download/upload from/to certain server implementations. - -The bug does not manifest with OpenSSH, which silently drops the NUL -byte (eventually with any garbage that follows the NUL byte) before -executing it. - -Bug: https://bugzilla.redhat.com/1489736 - -Upstream-commit: 819ef4f2037490b6aa2e870aea851b6364184090 -Signed-off-by: Kamil Dudka <kdudka@redhat.com> ---- - src/scp.c | 8 ++++---- - 1 file changed, 4 insertions(+), 4 deletions(-) - -diff --git a/src/scp.c b/src/scp.c -index f3d4995..c6451bc 100644 ---- a/src/scp.c -+++ b/src/scp.c -@@ -303,8 +303,8 @@ scp_recv(LIBSSH2_SESSION * session, const char *path, libssh2_struct_stat * sb) - &session->scpRecv_command[cmd_len], - session->scpRecv_command_len - cmd_len); - -- session->scpRecv_command[cmd_len] = '\0'; -- session->scpRecv_command_len = cmd_len + 1; -+ /* the command to exec should _not_ be NUL-terminated */ -+ session->scpRecv_command_len = cmd_len; - - _libssh2_debug(session, LIBSSH2_TRACE_SCP, - "Opening channel for SCP receive"); -@@ -845,8 +845,8 @@ scp_send(LIBSSH2_SESSION * session, const char *path, int mode, - &session->scpSend_command[cmd_len], - session->scpSend_command_len - cmd_len); - -- session->scpSend_command[cmd_len] = '\0'; -- session->scpSend_command_len = cmd_len + 1; -+ /* the command to exec should _not_ be NUL-terminated */ -+ session->scpSend_command_len = cmd_len; - - _libssh2_debug(session, LIBSSH2_TRACE_SCP, - "Opening channel for SCP send"); --- -2.13.5 - |