Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Jul 2015 15:22:33 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org
Subject:   svn commit: r392588 - in branches/2015Q3/devel/pcre: . files
Message-ID:  <201507201522.t6KFMXPF020103@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Mon Jul 20 15:22:32 2015
New Revision: 392588
URL: https://svnweb.freebsd.org/changeset/ports/392588

Log:
  MFH: r392587
  
  Apply upstream fixes for a buffer overflow issue:
  1571 Fix buffer overflow for forward reference within backward assertion
  with excess closing parenthesis. Bugzilla 1651.
  
  Obtained from:	PCRE svn (r1571)
  Security:	8a1d0e63-1e07-11e5-b43d-002590263bf5
  Security:	CVE-2015-5073
  PR:		201188
  Approved by:	ports-secteam (with hat)

Added:
  branches/2015Q3/devel/pcre/files/patch-CVE-2015-5073
     - copied unchanged from r392587, head/devel/pcre/files/patch-CVE-2015-5073
Modified:
  branches/2015Q3/devel/pcre/Makefile
Directory Properties:
  branches/2015Q3/   (props changed)

Modified: branches/2015Q3/devel/pcre/Makefile
==============================================================================
--- branches/2015Q3/devel/pcre/Makefile	Mon Jul 20 15:21:25 2015	(r392587)
+++ branches/2015Q3/devel/pcre/Makefile	Mon Jul 20 15:22:32 2015	(r392588)
@@ -3,7 +3,7 @@
 
 PORTNAME=	pcre
 PORTVERSION=	8.37
-PORTREVISION=	1
+PORTREVISION=	2
 CATEGORIES=	devel
 MASTER_SITES=	SF/${PORTNAME}/${PORTNAME}/${PORTVERSION} \
 		ftp://ftp.csx.cam.ac.uk/pub/software/programming/${PORTNAME}/ \

Copied: branches/2015Q3/devel/pcre/files/patch-CVE-2015-5073 (from r392587, head/devel/pcre/files/patch-CVE-2015-5073)
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ branches/2015Q3/devel/pcre/files/patch-CVE-2015-5073	Mon Jul 20 15:22:32 2015	(r392588, copy of r392587, head/devel/pcre/files/patch-CVE-2015-5073)
@@ -0,0 +1,11 @@
+--- pcre_compile.c.orig	2015/06/22 09:38:41	1570
++++ pcre_compile.c	2015/06/23 16:34:53	1571
+@@ -9449,7 +9449,7 @@
+ exceptional ones forgo this. We scan the pattern to check that they are fixed
+ length, and set their lengths. */
+ 
+-if (cd->check_lookbehind)
++if (errorcode == 0 && cd->check_lookbehind)
+   {
+   pcre_uchar *cc = (pcre_uchar *)codestart;
+ 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201507201522.t6KFMXPF020103>