diff options
author | Max Rees <maxcrees@me.com> | 2020-02-28 18:34:56 -0600 |
---|---|---|
committer | Max Rees <maxcrees@me.com> | 2020-03-09 21:27:42 -0500 |
commit | ce04e9e76552231fd2940d9e02536ebecda3d4a4 (patch) | |
tree | 70fc032244ce0362e01d77ff0647cb9e5e5de819 /user/hunspell | |
parent | 757c7417918541af9e656e023b2ead86998a07d9 (diff) | |
download | packages-ce04e9e76552231fd2940d9e02536ebecda3d4a4.tar.gz packages-ce04e9e76552231fd2940d9e02536ebecda3d4a4.tar.bz2 packages-ce04e9e76552231fd2940d9e02536ebecda3d4a4.tar.xz packages-ce04e9e76552231fd2940d9e02536ebecda3d4a4.zip |
user/hunspell: patch CVE-2019-16707 (#203)
Diffstat (limited to 'user/hunspell')
-rw-r--r-- | user/hunspell/APKBUILD | 10 | ||||
-rw-r--r-- | user/hunspell/CVE-2019-16707.patch | 22 |
2 files changed, 30 insertions, 2 deletions
diff --git a/user/hunspell/APKBUILD b/user/hunspell/APKBUILD index 79da8d619..16b3df24e 100644 --- a/user/hunspell/APKBUILD +++ b/user/hunspell/APKBUILD @@ -9,7 +9,12 @@ license="GPL-2.0+ AND LGPL-2.0+ AND MPL-1.1" depends="" makedepends="ncurses-dev autoconf automake libtool" subpackages="$pkgname-dev $pkgname-doc $pkgname-lang" -source="$pkgname-$pkgver.tar.gz::https://github.com/hunspell/hunspell/archive/v$pkgver.tar.gz" +source="$pkgname-$pkgver.tar.gz::https://github.com/hunspell/hunspell/archive/v$pkgver.tar.gz + CVE-2019-16707.patch" + +# secfixes: +# 1.7.0-r1: +# - CVE-2019-16707 prepare() { default_prepare @@ -35,4 +40,5 @@ package() { make -j1 DESTDIR="$pkgdir" install } -sha512sums="8149b2e8b703a0610c9ca5160c2dfad3cf3b85b16b3f0f5cfcb7ebb802473b2d499e8e2d0a637a97a37a24d62424e82d3880809210d3f043fa17a4970d47c903 hunspell-1.7.0.tar.gz" +sha512sums="8149b2e8b703a0610c9ca5160c2dfad3cf3b85b16b3f0f5cfcb7ebb802473b2d499e8e2d0a637a97a37a24d62424e82d3880809210d3f043fa17a4970d47c903 hunspell-1.7.0.tar.gz +e7674819a9da4c3d742d34338d68d137d8613f97be2d25bf20db5219d4dd626f59a63ed4757b92f34307f499f2d687014065cdea97b55c98db295a8290300d2d CVE-2019-16707.patch" diff --git a/user/hunspell/CVE-2019-16707.patch b/user/hunspell/CVE-2019-16707.patch new file mode 100644 index 000000000..649eef5b2 --- /dev/null +++ b/user/hunspell/CVE-2019-16707.patch @@ -0,0 +1,22 @@ +From ac938e2ecb48ab4dd21298126c7921689d60571b Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com> +Date: Tue, 12 Nov 2019 20:03:15 +0000 +Subject: [PATCH] invalid read memory access #624 + +--- + src/hunspell/suggestmgr.cxx | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/hunspell/suggestmgr.cxx b/src/hunspell/suggestmgr.cxx +index dba084e9..c23f165a 100644 +--- a/src/hunspell/suggestmgr.cxx ++++ b/src/hunspell/suggestmgr.cxx +@@ -2040,7 +2040,7 @@ int SuggestMgr::leftcommonsubstring( + int l2 = su2.size(); + // decapitalize dictionary word + if (complexprefixes) { +- if (su1[l1 - 1] == su2[l2 - 1]) ++ if (l1 && l2 && su1[l1 - 1] == su2[l2 - 1]) + return 1; + } else { + unsigned short idx = su2.empty() ? 0 : (su2[0].h << 8) + su2[0].l; |