diff options
author | bsiegert <bsiegert@pkgsrc.org> | 2017-05-29 18:35:08 +0000 |
---|---|---|
committer | bsiegert <bsiegert@pkgsrc.org> | 2017-05-29 18:35:08 +0000 |
commit | dc2f838eca13784e6531c1d557fc2316f15de400 (patch) | |
tree | 44373f905b6ad03c5430d10a78d9200686981769 /textproc | |
parent | b3bd36b99571baa6f0732db30fc0789f773ef00d (diff) | |
download | pkgsrc-dc2f838eca13784e6531c1d557fc2316f15de400.tar.gz |
Pullup ticket #5463 - requested by sevan
textproc/libxslt: security fix
Revisions pulled up:
- textproc/libxslt/Makefile 1.105
- textproc/libxslt/distinfo 1.60
- textproc/libxslt/patches/patch-CVE-2017-5029 1.1
---
Module Name: pkgsrc
Committed By: tez
Date: Tue May 23 23:37:01 UTC 2017
Modified Files:
pkgsrc/textproc/libxslt: Makefile distinfo
Added Files:
pkgsrc/textproc/libxslt/patches: patch-CVE-2017-5029
Log Message:
Add patch for CVE-2017-5029
Diffstat (limited to 'textproc')
-rw-r--r-- | textproc/libxslt/Makefile | 4 | ||||
-rw-r--r-- | textproc/libxslt/distinfo | 3 | ||||
-rw-r--r-- | textproc/libxslt/patches/patch-CVE-2017-5029 | 58 |
3 files changed, 62 insertions, 3 deletions
diff --git a/textproc/libxslt/Makefile b/textproc/libxslt/Makefile index 99eec126786..0ed1d54ce1e 100644 --- a/textproc/libxslt/Makefile +++ b/textproc/libxslt/Makefile @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.104 2016/07/09 06:39:06 wiz Exp $ +# $NetBSD: Makefile,v 1.104.6.1 2017/05/29 18:35:08 bsiegert Exp $ -PKGREVISION= 1 +PKGREVISION= 2 .include "Makefile.common" BUILD_DEPENDS+= docbook-xml-[0-9]*:../../textproc/docbook-xml diff --git a/textproc/libxslt/distinfo b/textproc/libxslt/distinfo index 160bcd5dcdd..c0cbf79cfcc 100644 --- a/textproc/libxslt/distinfo +++ b/textproc/libxslt/distinfo @@ -1,8 +1,9 @@ -$NetBSD: distinfo,v 1.57 2016/05/29 21:06:46 wiz Exp $ +$NetBSD: distinfo,v 1.57.8.1 2017/05/29 18:35:08 bsiegert Exp $ SHA1 (libxslt-1.1.29.tar.gz) = edcaeabb3555ae44853bdc406ee9521fb65c620d RMD160 (libxslt-1.1.29.tar.gz) = 40a5202b3967db6b01cd6c0e722a9e459cac7960 SHA512 (libxslt-1.1.29.tar.gz) = a1ce555a74a9dabe65e8f64bb66e27e77760fd76940d88f2d59f58dd63ca73c8ae59f3fcbd8e76c8f92ff992fb0c09328528c20ea38ccac83e63252106bf5f31 Size (libxslt-1.1.29.tar.gz) = 3428524 bytes +SHA1 (patch-CVE-2017-5029) = 98658fa048e440ef72460d4e082c0fd282154aa1 SHA1 (patch-ae) = 40ce3940a93b6a2dc804f62676909d3313e0ea52 SHA1 (patch-ah) = f92809ab34e53962ec8b62e50ded7a27c89f10f8 diff --git a/textproc/libxslt/patches/patch-CVE-2017-5029 b/textproc/libxslt/patches/patch-CVE-2017-5029 new file mode 100644 index 00000000000..507578e25c4 --- /dev/null +++ b/textproc/libxslt/patches/patch-CVE-2017-5029 @@ -0,0 +1,58 @@ +$NetBSD: patch-CVE-2017-5029,v 1.1.2.2 2017/05/29 18:35:08 bsiegert Exp $ + +Patch for CVE-2017-5029 from: + https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5 + + +--- libxslt/xsltInternals.h.orig 2017-05-23 23:14:05.625798800 +0000 ++++ libxslt/xsltInternals.h +@@ -1754,8 +1754,8 @@ struct _xsltTransformContext { + * Speed optimization when coalescing text nodes + */ + const xmlChar *lasttext; /* last text node content */ +- unsigned int lasttsize; /* last text node size */ +- unsigned int lasttuse; /* last text node use */ ++ int lasttsize; /* last text node size */ ++ int lasttuse; /* last text node use */ + /* + * Per Context Debugging + */ + +--- libxslt/transform.c.orig 2017-05-23 23:14:23.480987400 +0000 ++++ libxslt/transform.c +@@ -816,13 +816,32 @@ xsltAddTextString(xsltTransformContextPt + return(target); + + if (ctxt->lasttext == target->content) { ++ int minSize; + +- if (ctxt->lasttuse + len >= ctxt->lasttsize) { ++ /* Check for integer overflow accounting for NUL terminator. */ ++ if (len >= INT_MAX - ctxt->lasttuse) { ++ xsltTransformError(ctxt, NULL, target, ++ "xsltCopyText: text allocation failed\n"); ++ return(NULL); ++ } ++ minSize = ctxt->lasttuse + len + 1; ++ ++ if (ctxt->lasttsize < minSize) { + xmlChar *newbuf; + int size; ++ int extra; ++ ++ /* Double buffer size but increase by at least 100 bytes. */ ++ extra = minSize < 100 ? 100 : minSize; ++ ++ /* Check for integer overflow. */ ++ if (extra > INT_MAX - ctxt->lasttsize) { ++ size = INT_MAX; ++ } ++ else { ++ size = ctxt->lasttsize + extra; ++ } + +- size = ctxt->lasttsize + len + 100; +- size *= 2; + newbuf = (xmlChar *) xmlRealloc(target->content,size); + if (newbuf == NULL) { + xsltTransformError(ctxt, NULL, target, |