Gentoo Archives: gentoo-commits

From: "Mart Raudsepp (leio)" <leio@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo-x86 commit in dev-libs/glib/files: glib-2.16.3-pcre-buffer-overflow.patch
Date: Tue, 01 Jul 2008 00:52:26
Message-Id: E1KDU6X-0003yN-0E@stork.gentoo.org
1 leio 08/07/01 00:52:21
2
3 Added: glib-2.16.3-pcre-buffer-overflow.patch
4 Log:
5 Fix for a heap-based buffer overflow possibility in the included modified copy of PCRE, bug 230039, related to CVE-2008-2371
6 (Portage version: 2.2_rc1/cvs/Linux 2.6.25-gentoo-r4 i686, RepoMan options: --force)
7
8 Revision Changes Path
9 1.1 dev-libs/glib/files/glib-2.16.3-pcre-buffer-overflow.patch
10
11 file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/dev-libs/glib/files/glib-2.16.3-pcre-buffer-overflow.patch?rev=1.1&view=markup
12 plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/dev-libs/glib/files/glib-2.16.3-pcre-buffer-overflow.patch?rev=1.1&content-type=text/plain
13
14 Index: glib-2.16.3-pcre-buffer-overflow.patch
15 ===================================================================
16 --- glib/pcre/pcre_compile.c.orig 2008-06-30 10:42:54.000000000 +0300
17 +++ glib/pcre/pcre_compile.c 2008-06-30 10:43:10.000000000 +0300
18 @@ -4699,11 +4699,11 @@ we set the flag only if there is a liter
19 {
20 if (code == cd->start_code + 1 + LINK_SIZE &&
21 (lengthptr == NULL || *lengthptr == 2 + 2*LINK_SIZE))
22 {
23 cd->external_options = newoptions;
24 - options = newoptions;
25 + options = *optionsptr = newoptions;
26 }
27 else
28 {
29 if ((options & PCRE_IMS) != (newoptions & PCRE_IMS))
30 {
31
32
33
34 --
35 gentoo-commits@l.g.o mailing list