<pre style='margin:0'>
Zero King (l2dy) pushed a commit to branch master
in repository macports-ports.

</pre>
<p><a href="https://github.com/macports/macports-ports/commit/86d4e60cd4ce7a3f6b20619b9e603486028db31f">https://github.com/macports/macports-ports/commit/86d4e60cd4ce7a3f6b20619b9e603486028db31f</a></p>
<pre style="white-space: pre; background: #F8F8F8">The following commit(s) were added to refs/heads/master by this push:
<span style='display:block; white-space:pre;color:#404040;'>     new 86d4e60  p7zip: Fix CVE-2017-17969
</span>86d4e60 is described below

<span style='display:block; white-space:pre;color:#808000;'>commit 86d4e60cd4ce7a3f6b20619b9e603486028db31f
</span>Author: Zero King <l2dy@macports.org>
AuthorDate: Mon Feb 5 02:55:06 2018 +0000

<span style='display:block; white-space:pre;color:#404040;'>    p7zip: Fix CVE-2017-17969
</span><span style='display:block; white-space:pre;color:#404040;'>    
</span><span style='display:block; white-space:pre;color:#404040;'>    * remove integrated reinplace patch
</span><span style='display:block; white-space:pre;color:#404040;'>    * rename existing patch
</span>---
 archivers/p7zip/Portfile                           | 13 +++-------
 ...VE-2016-9296.patch => patch-CVE-2016-9296.diff} |  0
 archivers/p7zip/files/patch-CVE-2017-17969.diff    | 28 ++++++++++++++++++++++
 3 files changed, 31 insertions(+), 10 deletions(-)

<span style='display:block; white-space:pre;color:#808080;'>diff --git a/archivers/p7zip/Portfile b/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;color:#808080;'>index 06d0736..331eaca 100644
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>--- a/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/archivers/p7zip/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -4,7 +4,7 @@ PortSystem      1.0
</span> 
 name            p7zip
 version         16.02
<span style='display:block; white-space:pre;background:#ffe0e0;'>-revision        1
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+revision        2
</span> categories      archivers
 # contains unrar code which has a restrictive license
 license         LGPL-2.1+ Restrictive/Distributable
<span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -28,15 +28,8 @@ checksums       rmd160  03550898e45b3eabe4ea0df5ee3787bd8f179fd0 \
</span> 
 variant universal {}
 
<span style='display:block; white-space:pre;background:#ffe0e0;'>-patchfiles      CVE-2016-9296.patch
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-post-patch {
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-    # if not root, installing with restricted permissions causes errors
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-    #     when attempting to remove work directory
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-    # see http://www.linuxfromscratch.org/blfs/view/svn/general/p7zip.html
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-    reinplace "s|chmod 444|chmod 644|g" ${worksrcpath}/install.sh
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-    reinplace "s|chmod 555|chmod 755|g" ${worksrcpath}/install.sh
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>-}
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+patchfiles      patch-CVE-2016-9296.diff \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                patch-CVE-2017-17969.diff
</span> 
 configure {
     copy -force ${worksrcpath}/makefile.macosx_llvm_64bits ${worksrcpath}/makefile.machine
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/archivers/p7zip/files/CVE-2016-9296.patch b/archivers/p7zip/files/patch-CVE-2016-9296.diff
</span>similarity index 100%
rename from archivers/p7zip/files/CVE-2016-9296.patch
rename to archivers/p7zip/files/patch-CVE-2016-9296.diff
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/archivers/p7zip/files/patch-CVE-2017-17969.diff b/archivers/p7zip/files/patch-CVE-2017-17969.diff
</span>new file mode 100644
<span style='display:block; white-space:pre;color:#808080;'>index 0000000..2b27293
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>--- /dev/null
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/archivers/p7zip/files/patch-CVE-2017-17969.diff
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -0,0 +1,28 @@
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Subject: Heap-based buffer overflow in 7zip/Compress/ShrinkDecoder.cpp
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Origin: vendor, https://sourceforge.net/p/p7zip/bugs/_discuss/thread/0920f369/27d7/attachment/CVE-2017-17969.patch
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Forwarded: https://sourceforge.net/p/p7zip/bugs/_discuss/thread/0920f369/#27d7
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Bug: https://sourceforge.net/p/p7zip/bugs/204/
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Bug-Debian: https://bugs.debian.org/888297
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2017-17969
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Author: Antoine Beaupré <anarcat@debian.org>
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Reviewed-by: Salvatore Bonaccorso <carnil@debian.org>
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Last-Update: 2018-02-01
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+Applied-Upstream: 18.00-beta
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+--- CPP/7zip/Compress/ShrinkDecoder.cpp
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++++ CPP/7zip/Compress/ShrinkDecoder.cpp
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+@@ -121,8 +121,13 @@ HRESULT CDecoder::CodeReal(ISequentialIn
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+     {
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+       _stack[i++] = _suffixes[cur];
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+       cur = _parents[cur];
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++      if (cur >= kNumItems || i >= kNumItems)
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++        break;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+     }
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+-    
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++    if (cur >= kNumItems || i >= kNumItems)
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++      break;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>++
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+     _stack[i++] = (Byte)cur;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+     lastChar2 = (Byte)cur;
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ 
</span></pre><pre style='margin:0'>

</pre>