pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: [pkgsrc-2016Q3] pkgsrc/net/wget



Module Name:    pkgsrc
Committed By:   bsiegert
Date:           Thu Nov  3 19:52:25 UTC 2016

Modified Files:
        pkgsrc/net/wget [pkgsrc-2016Q3]: Makefile distinfo
Added Files:
        pkgsrc/net/wget/patches [pkgsrc-2016Q3]: patch-CVE-2016-7098

Log Message:
Pullup ticket #5148 - requested by spz
net/wget: security fix

Revisions pulled up:
- net/wget/Makefile                                             1.133
- net/wget/distinfo                                             1.52
- net/wget/patches/patch-CVE-2016-7098                          1.1

---
   Module Name: pkgsrc
   Committed By:        spz
   Date:                Sun Oct 30 20:55:39 UTC 2016

   Modified Files:
        pkgsrc/net/wget: Makefile distinfo
   Added Files:
        pkgsrc/net/wget/patches: patch-CVE-2016-7098

   Log Message:
   add a patch for CVE-2016-7098 from upstream


To generate a diff of this commit:
cvs rdiff -u -r1.132 -r1.132.2.1 pkgsrc/net/wget/Makefile
cvs rdiff -u -r1.51 -r1.51.4.1 pkgsrc/net/wget/distinfo
cvs rdiff -u -r0 -r1.1.2.2 pkgsrc/net/wget/patches/patch-CVE-2016-7098

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/net/wget/Makefile
diff -u pkgsrc/net/wget/Makefile:1.132 pkgsrc/net/wget/Makefile:1.132.2.1
--- pkgsrc/net/wget/Makefile:1.132      Mon Sep 19 13:04:26 2016
+++ pkgsrc/net/wget/Makefile    Thu Nov  3 19:52:25 2016
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.132 2016/09/19 13:04:26 wiz Exp $
+# $NetBSD: Makefile,v 1.132.2.1 2016/11/03 19:52:25 bsiegert Exp $
 
 DISTNAME=      wget-1.18
-PKGREVISION=   2
+PKGREVISION=   3
 CATEGORIES=    net
 MASTER_SITES=  ${MASTER_SITE_GNU:=wget/}
 EXTRACT_SUFX=  .tar.xz

Index: pkgsrc/net/wget/distinfo
diff -u pkgsrc/net/wget/distinfo:1.51 pkgsrc/net/wget/distinfo:1.51.4.1
--- pkgsrc/net/wget/distinfo:1.51       Sat Jun 11 18:33:22 2016
+++ pkgsrc/net/wget/distinfo    Thu Nov  3 19:52:25 2016
@@ -1,8 +1,9 @@
-$NetBSD: distinfo,v 1.51 2016/06/11 18:33:22 wiz Exp $
+$NetBSD: distinfo,v 1.51.4.1 2016/11/03 19:52:25 bsiegert Exp $
 
 SHA1 (wget-1.18.tar.xz) = 02d451e658f600ee519c42cbf4d3bfe4e49b6c4f
 RMD160 (wget-1.18.tar.xz) = 4fdf9c523b434050eeccfbd14b98c90c591d7ce4
 SHA512 (wget-1.18.tar.xz) = a3f6fe2f44a8d797659d55cffaf81eb82b770c96222a0ee29bc4931b13846f8d8b9a07806f2197723c873a1248922d59cca5a81869661d9c6c3107447c184338
 Size (wget-1.18.tar.xz) = 1922376 bytes
+SHA1 (patch-CVE-2016-7098) = fa6c96a24590c191440ae91f76e5c10e8db84d4b
 SHA1 (patch-configure) = 4d65f3e3c4d60174442aa1b75b64b7511bbc6497
 SHA1 (patch-doc_wget.texi) = 6db25b3500ff4617b5ade34d9013b1f9876104f8

Added files:

Index: pkgsrc/net/wget/patches/patch-CVE-2016-7098
diff -u /dev/null pkgsrc/net/wget/patches/patch-CVE-2016-7098:1.1.2.2
--- /dev/null   Thu Nov  3 19:52:25 2016
+++ pkgsrc/net/wget/patches/patch-CVE-2016-7098 Thu Nov  3 19:52:25 2016
@@ -0,0 +1,56 @@
+patch for CVE-2016-7098 from
+http://git.savannah.gnu.org/cgit/wget.git/commit/?id=9ffb64ba6a8121909b01e984deddce8d096c498d
+http://git.savannah.gnu.org/cgit/wget.git/commit/?id=690c47e3b18c099843cdf557a0425d701fca4957
+(only the compilable parts)
+
+--- src/http.c.orig    2016-06-09 16:10:14.000000000 +0000
++++ src/http.c 2016-10-27 20:02:46.000000000 +0000
+@@ -39,6 +39,7 @@ as that of the covered work.  */
+ #include <errno.h>
+ #include <time.h>
+ #include <locale.h>
++#include <fcntl.h>
+ 
+ #include "hash.h"
+ #include "http.h"
+@@ -1564,6 +1565,7 @@ struct http_stat
+ #ifdef HAVE_METALINK
+   metalink_t *metalink;
+ #endif
++  bool temporary;               /* downloading a temporary file */
+ };
+ 
+ static void
+@@ -2254,6 +2256,15 @@ check_file_output (struct url *u, struct
+       xfree (local_file);
+     }
+ 
++  hs->temporary = opt.delete_after || opt.spider || !acceptable (hs->local_file);
++  if (hs->temporary)
++    {
++      char *tmp = NULL;
++      asprintf (&tmp, "%s.tmp", hs->local_file);
++      xfree (hs->local_file);
++      hs->local_file = tmp;
++    }
++
+   /* TODO: perform this check only once. */
+   if (!hs->existence_checked && file_exists_p (hs->local_file))
+     {
+@@ -2467,7 +2478,15 @@ open_output_stream (struct http_stat *hs
+           open_id = 22;
+           *fp = fopen (hs->local_file, "wb", FOPEN_OPT_ARGS);
+ #else /* def __VMS */
+-          *fp = fopen (hs->local_file, "wb");
++          if (hs->temporary)
++            {
++              *fp = fdopen (open (hs->local_file, O_BINARY | O_CREAT | O_TRUNC | O_WRONLY, S_IRUSR | S_IWUSR), "wb");
++            }
++          else
++            {
++              *fp = fopen (hs->local_file, "wb");
++            }
++
+ #endif /* def __VMS [else] */
+         }
+       else



Home | Main Index | Thread Index | Old Index