File tmux-CVE-2022-47016.patch of Package tmux.27525
Index: tmux-3.1c/client.c
===================================================================
--- tmux-3.1c.orig/client.c
+++ tmux-3.1c/client.c
@@ -534,6 +534,8 @@ client_write_open(void *data, size_t dat
cf->event = bufferevent_new(cf->fd, NULL, client_write_callback,
client_write_error_callback, cf);
+ if (cf->event == NULL)
+ fatalx("out of memory");
bufferevent_enable(cf->event, EV_WRITE);
goto reply;
@@ -689,6 +691,8 @@ client_read_open(void *data, size_t data
cf->event = bufferevent_new(cf->fd, client_read_callback, NULL,
client_read_error_callback, cf);
+ if (cf->event == NULL)
+ fatalx("out of memory");
bufferevent_enable(cf->event, EV_READ);
return;
Index: tmux-3.1c/window.c
===================================================================
--- tmux-3.1c.orig/window.c
+++ tmux-3.1c/window.c
@@ -984,6 +984,8 @@ window_pane_set_event(struct window_pane
wp->event = bufferevent_new(wp->fd, window_pane_read_callback,
NULL, window_pane_error_callback, wp);
+ if (wp->event == NULL)
+ fatalx("out of memory");
bufferevent_setwatermark(wp->event, EV_READ, 0, READ_SIZE);
bufferevent_enable(wp->event, EV_READ|EV_WRITE);