Blame SOURCES/php-5.6.5-CVE-2015-2305.patch

4c9102
From fb04dcf6dbb48aecd8d2dc986806cb58c8ae5282 Mon Sep 17 00:00:00 2001
4c9102
From: Stanislav Malyshev <stas@php.net>
4c9102
Date: Tue, 17 Mar 2015 17:04:57 -0700
4c9102
Subject: [PATCH] Fix bug #69248 - heap overflow vulnerability in regcomp.c
4c9102
4c9102
Merged from https://github.com/garyhouston/regex/commit/70bc2965604b6b8aaf260049e64c708dddf85334
4c9102
---
4c9102
 NEWS                     |  3 +++
4c9102
 ext/ereg/regex/regcomp.c | 10 +++++++++-
4c9102
 2 files changed, 12 insertions(+), 1 deletion(-)
4c9102
4c9102
diff --git a/ext/ereg/regex/regcomp.c b/ext/ereg/regex/regcomp.c
4c9102
index 156eee9..f4bfc1c 100644
4c9102
--- a/ext/ereg/regex/regcomp.c
4c9102
+++ b/ext/ereg/regex/regcomp.c
4c9102
@@ -117,7 +117,15 @@ int cflags;
4c9102
 							(NC-1)*sizeof(cat_t));
4c9102
 	if (g == NULL)
4c9102
 		return(REG_ESPACE);
4c9102
-	p->ssize = len/(size_t)2*(size_t)3 + (size_t)1;	/* ugh */
4c9102
+	{
4c9102
+		/* Patched for CERT Vulnerability Note VU#695940, Feb 2015. */
4c9102
+		size_t new_ssize = len/(size_t)2*(size_t)3 + (size_t)1; /* ugh */
4c9102
+		if (new_ssize < len || new_ssize > LONG_MAX / sizeof(sop)) {
4c9102
+			free((char *) g);
4c9102
+			return REG_INVARG;
4c9102
+		}
4c9102
+		p->ssize = new_ssize;
4c9102
+	}
4c9102
 	p->strip = (sop *)malloc(p->ssize * sizeof(sop));
4c9102
 	p->slen = 0;
4c9102
 	if (p->strip == NULL) {
4c9102
-- 
4c9102
2.1.4
4c9102