<pre style='margin:0'>
Lawrence Velázquez (larryv) pushed a commit to branch master
in repository macports-ports.
</pre>
<p><a href="https://github.com/macports/macports-ports/commit/63e2886d7c5bbdc3ac84e6a67751743d6319a4bc">https://github.com/macports/macports-ports/commit/63e2886d7c5bbdc3ac84e6a67751743d6319a4bc</a></p>
<pre style="white-space: pre; background: #F8F8F8">The following commit(s) were added to refs/heads/master by this push:
<span style='display:block; white-space:pre;color:#404040;'> new 63e2886 p7zip: Avoid potential null pointer dereference
</span>63e2886 is described below
<span style='display:block; white-space:pre;color:#808000;'>commit 63e2886d7c5bbdc3ac84e6a67751743d6319a4bc
</span>Author: Lawrence Velázquez <larryv@macports.org>
AuthorDate: Wed Nov 30 19:31:52 2016 -0500
<span style='display:block; white-space:pre;color:#404040;'> p7zip: Avoid potential null pointer dereference
</span><span style='display:block; white-space:pre;color:#404040;'>
</span><span style='display:block; white-space:pre;color:#404040;'> Backported from 7-Zip 16.03 for Windows, but p7zip is still on 16.02.
</span><span style='display:block; white-space:pre;color:#404040;'>
</span><span style='display:block; white-space:pre;color:#404040;'> Closes https://trac.macports.org/ticket/52982 (maintainer override to
</span><span style='display:block; white-space:pre;color:#404040;'> address security vulnerability).
</span>---
archivers/p7zip/Portfile | 3 +++
archivers/p7zip/files/CVE-2016-9296.patch | 28 ++++++++++++++++++++++++++++
2 files changed, 31 insertions(+)
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/archivers/p7zip/Portfile b/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;color:#808080;'>index 84d26c2..0858c51 100644
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>--- a/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -4,6 +4,7 @@ PortSystem 1.0
</span>
name p7zip
version 16.02
<span style='display:block; white-space:pre;background:#e0ffe0;'>+revision 1
</span> categories archivers
# contains unrar code which has a restrictive license
license LGPL-2.1+ Restrictive/Distributable
<span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -27,6 +28,8 @@ checksums rmd160 03550898e45b3eabe4ea0df5ee3787bd8f179fd0 \
</span>
variant universal {}
<span style='display:block; white-space:pre;background:#e0ffe0;'>+patchfiles CVE-2016-9296.patch
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span> post-patch {
# if not root, installing with restricted permissions causes errors
# when attempting to remove work directory
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/archivers/p7zip/files/CVE-2016-9296.patch b/archivers/p7zip/files/CVE-2016-9296.patch
</span>new file mode 100644
<span style='display:block; white-space:pre;color:#808080;'>index 0000000..fddb3d9
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>--- /dev/null
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/archivers/p7zip/files/CVE-2016-9296.patch
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -0,0 +1,28 @@
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+p7zip: Avoid crashing while decoding certain malformed input
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9296
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+https://sourceforge.net/p/p7zip/bugs/185/#32aa
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+https://sourceforge.net/p/p7zip/discussion/383043/thread/648d34db
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+https://trac.macports.org/ticket/52982
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Check whether folders.PackPositions is nonnull before accessing it. Fix
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+developed by Igor Pavlov.
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Upstream-Status: Backport [7-Zip 16.03 for Windows]
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+CVE: CVE-2016-9296
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Signed-off-by: Lawrence Velázquez <larryv@macports.org>
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Index: CPP/7zip/Archive/7z/7zIn.cpp
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+===================================================================
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+--- CPP/7zip/Archive/7z/7zIn.cpp.orig
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++++ CPP/7zip/Archive/7z/7zIn.cpp
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+@@ -1097,7 +1097,8 @@ HRESULT CInArchive::ReadAndDecodePackedS
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ if (CrcCalc(data, unpackSize) != folders.FolderCRCs.Vals[i])
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ ThrowIncorrect();
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ }
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+- HeadersSize += folders.PackPositions[folders.NumPackStreams];
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++ if (folders.PackPositions)
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++ HeadersSize += folders.PackPositions[folders.NumPackStreams];
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ return S_OK;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ }
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span></pre><pre style='margin:0'>
</pre>