From ca40fd69eb679c21aecb52b101341b981401bcc6 Mon Sep 17 00:00:00 2001 From: Anton Berezin Date: Wed, 2 Feb 2005 15:58:07 +0000 Subject: Fix vulnerability in suidperl/sperl [CAN-2005-0155]. Fix buffer overflow in perl [CAN-2005-0156]. Bump PORTREVISION. Upgrade from previous versions/revisions of lang/perl5.8 is recommended. Submitted by: Nicholas Clark --- lang/perl5.16/files/patch-perlio.c | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 lang/perl5.16/files/patch-perlio.c (limited to 'lang/perl5.16/files/patch-perlio.c') diff --git a/lang/perl5.16/files/patch-perlio.c b/lang/perl5.16/files/patch-perlio.c new file mode 100644 index 000000000000..c680381d2123 --- /dev/null +++ b/lang/perl5.16/files/patch-perlio.c @@ -0,0 +1,22 @@ +$FreeBSD$ + +--- perlio.c.orig Wed Feb 2 16:45:24 2005 ++++ perlio.c Wed Feb 2 16:45:34 2005 +@@ -454,7 +454,7 @@ PerlIO_debug(const char *fmt, ...) + va_list ap; + dSYS; + va_start(ap, fmt); +- if (!dbg) { ++ if (!dbg && !PL_tainting && PL_uid == PL_euid && PL_gid == PL_egid) { + char *s = PerlEnv_getenv("PERLIO_DEBUG"); + if (s && *s) + dbg = PerlLIO_open3(s, O_WRONLY | O_CREAT | O_APPEND, 0666); +@@ -471,7 +471,7 @@ PerlIO_debug(const char *fmt, ...) + s = CopFILE(PL_curcop); + if (!s) + s = "(none)"; +- sprintf(buffer, "%s:%" IVdf " ", s, (IV) CopLINE(PL_curcop)); ++ sprintf(buffer, "%.40s:%" IVdf " ", s, (IV) CopLINE(PL_curcop)); + len = strlen(buffer); + vsprintf(buffer+len, fmt, ap); + PerlLIO_write(dbg, buffer, strlen(buffer)); -- cgit v1.2.3