From ca40fd69eb679c21aecb52b101341b981401bcc6 Mon Sep 17 00:00:00 2001 From: Anton Berezin Date: Wed, 2 Feb 2005 15:58:07 +0000 Subject: Fix vulnerability in suidperl/sperl [CAN-2005-0155]. Fix buffer overflow in perl [CAN-2005-0156]. Bump PORTREVISION. Upgrade from previous versions/revisions of lang/perl5.8 is recommended. Submitted by: Nicholas Clark --- lang/perl5.12/files/patch-patchlevel.h | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 lang/perl5.12/files/patch-patchlevel.h (limited to 'lang/perl5.12/files/patch-patchlevel.h') diff --git a/lang/perl5.12/files/patch-patchlevel.h b/lang/perl5.12/files/patch-patchlevel.h new file mode 100644 index 000000000000..c24961cf5dbc --- /dev/null +++ b/lang/perl5.12/files/patch-patchlevel.h @@ -0,0 +1,13 @@ +$FreeBSD$ + +--- patchlevel.h.orig Wed Feb 2 16:45:30 2005 ++++ patchlevel.h Wed Feb 2 16:45:34 2005 +@@ -120,6 +120,8 @@ hunk. + #if !defined(PERL_PATCHLEVEL_H_IMPLICIT) && !defined(LOCAL_PATCH_COUNT) + static char *local_patches[] = { + NULL ++ ,"SUIDPERLIO0 - fix PERLIO_DEBUG local root exploit (CAN-2005-0155)" ++ ,"SUIDPERLIO1 - fix PERLIO_DEBUG buffer overflow (CAN-2005-0156)" + ,NULL + }; + -- cgit v1.2.3