<pre style='margin:0'>
Zero King (l2dy) pushed a commit to branch master
in repository macports-ports.
</pre>
<p><a href="https://github.com/macports/macports-ports/commit/86d4e60cd4ce7a3f6b20619b9e603486028db31f">https://github.com/macports/macports-ports/commit/86d4e60cd4ce7a3f6b20619b9e603486028db31f</a></p>
<pre style="white-space: pre; background: #F8F8F8">The following commit(s) were added to refs/heads/master by this push:
<span style='display:block; white-space:pre;color:#404040;'> new 86d4e60 p7zip: Fix CVE-2017-17969
</span>86d4e60 is described below
<span style='display:block; white-space:pre;color:#808000;'>commit 86d4e60cd4ce7a3f6b20619b9e603486028db31f
</span>Author: Zero King <l2dy@macports.org>
AuthorDate: Mon Feb 5 02:55:06 2018 +0000
<span style='display:block; white-space:pre;color:#404040;'> p7zip: Fix CVE-2017-17969
</span><span style='display:block; white-space:pre;color:#404040;'>
</span><span style='display:block; white-space:pre;color:#404040;'> * remove integrated reinplace patch
</span><span style='display:block; white-space:pre;color:#404040;'> * rename existing patch
</span>---
archivers/p7zip/Portfile | 13 +++-------
...VE-2016-9296.patch => patch-CVE-2016-9296.diff} | 0
archivers/p7zip/files/patch-CVE-2017-17969.diff | 28 ++++++++++++++++++++++
3 files changed, 31 insertions(+), 10 deletions(-)
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/archivers/p7zip/Portfile b/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;color:#808080;'>index 06d0736..331eaca 100644
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>--- a/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -4,7 +4,7 @@ PortSystem 1.0
</span>
name p7zip
version 16.02
<span style='display:block; white-space:pre;background:#ffe0e0;'>-revision 1
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+revision 2
</span> categories archivers
# contains unrar code which has a restrictive license
license LGPL-2.1+ Restrictive/Distributable
<span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -28,15 +28,8 @@ checksums rmd160 03550898e45b3eabe4ea0df5ee3787bd8f179fd0 \
</span>
variant universal {}
<span style='display:block; white-space:pre;background:#ffe0e0;'>-patchfiles CVE-2016-9296.patch
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-post-patch {
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>- # if not root, installing with restricted permissions causes errors
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>- # when attempting to remove work directory
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>- # see http://www.linuxfromscratch.org/blfs/view/svn/general/p7zip.html
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>- reinplace "s|chmod 444|chmod 644|g" ${worksrcpath}/install.sh
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>- reinplace "s|chmod 555|chmod 755|g" ${worksrcpath}/install.sh
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-}
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+patchfiles patch-CVE-2016-9296.diff \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ patch-CVE-2017-17969.diff
</span>
configure {
copy -force ${worksrcpath}/makefile.macosx_llvm_64bits ${worksrcpath}/makefile.machine
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/archivers/p7zip/files/CVE-2016-9296.patch b/archivers/p7zip/files/patch-CVE-2016-9296.diff
</span>similarity index 100%
rename from archivers/p7zip/files/CVE-2016-9296.patch
rename to archivers/p7zip/files/patch-CVE-2016-9296.diff
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/archivers/p7zip/files/patch-CVE-2017-17969.diff b/archivers/p7zip/files/patch-CVE-2017-17969.diff
</span>new file mode 100644
<span style='display:block; white-space:pre;color:#808080;'>index 0000000..2b27293
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>--- /dev/null
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/archivers/p7zip/files/patch-CVE-2017-17969.diff
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -0,0 +1,28 @@
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Subject: Heap-based buffer overflow in 7zip/Compress/ShrinkDecoder.cpp
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Origin: vendor, https://sourceforge.net/p/p7zip/bugs/_discuss/thread/0920f369/27d7/attachment/CVE-2017-17969.patch
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Forwarded: https://sourceforge.net/p/p7zip/bugs/_discuss/thread/0920f369/#27d7
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Bug: https://sourceforge.net/p/p7zip/bugs/204/
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Bug-Debian: https://bugs.debian.org/888297
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2017-17969
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Author: Antoine Beaupré <anarcat@debian.org>
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Reviewed-by: Salvatore Bonaccorso <carnil@debian.org>
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Last-Update: 2018-02-01
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Applied-Upstream: 18.00-beta
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+--- CPP/7zip/Compress/ShrinkDecoder.cpp
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++++ CPP/7zip/Compress/ShrinkDecoder.cpp
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+@@ -121,8 +121,13 @@ HRESULT CDecoder::CodeReal(ISequentialIn
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ {
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ _stack[i++] = _suffixes[cur];
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ cur = _parents[cur];
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++ if (cur >= kNumItems || i >= kNumItems)
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++ break;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ }
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+-
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++ if (cur >= kNumItems || i >= kNumItems)
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++ break;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ _stack[i++] = (Byte)cur;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ lastChar2 = (Byte)cur;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span></pre><pre style='margin:0'>
</pre>