head 1.1; access; symbols pkgsrc-2026Q1:1.1.0.32 pkgsrc-2026Q1-base:1.1 pkgsrc-2025Q4:1.1.0.30 pkgsrc-2025Q4-base:1.1 pkgsrc-2025Q3:1.1.0.28 pkgsrc-2025Q3-base:1.1 pkgsrc-2025Q2:1.1.0.26 pkgsrc-2025Q2-base:1.1 pkgsrc-2025Q1:1.1.0.24 pkgsrc-2025Q1-base:1.1 pkgsrc-2024Q4:1.1.0.22 pkgsrc-2024Q4-base:1.1 pkgsrc-2024Q3:1.1.0.20 pkgsrc-2024Q3-base:1.1 pkgsrc-2024Q2:1.1.0.18 pkgsrc-2024Q2-base:1.1 pkgsrc-2024Q1:1.1.0.16 pkgsrc-2024Q1-base:1.1 pkgsrc-2023Q4:1.1.0.14 pkgsrc-2023Q4-base:1.1 pkgsrc-2023Q3:1.1.0.12 pkgsrc-2023Q3-base:1.1 pkgsrc-2023Q2:1.1.0.10 pkgsrc-2023Q2-base:1.1 pkgsrc-2023Q1:1.1.0.8 pkgsrc-2023Q1-base:1.1 pkgsrc-2022Q4:1.1.0.6 pkgsrc-2022Q4-base:1.1 pkgsrc-2022Q3:1.1.0.4 pkgsrc-2022Q3-base:1.1 pkgsrc-2022Q2:1.1.0.2 pkgsrc-2022Q2-base:1.1; locks; strict; comment @// @; 1.1 date 2022.04.30.01.08.20; author mrg; state Exp; branches; next ; commitid AWl4eOrsQDLA2aCD; desc @@ 1.1 log @avoid a buffer overflow, seen building libreoffice on arm64 netbsd-9. patch found by mlelstv@@ and comes from https://sourceforge.net/p/clucene/mailman/message/36991067/ bump pkg version. @ text @$NetBSD$ Avoid a buffer overflow crash. From: https://sourceforge.net/p/clucene/mailman/message/36991067/ by Stephan Bergmann . --- src/contribs-lib/CLucene/analysis/cjk/CJKAnalyzer.cpp.orig 2011-03-16 17:21:07.000000000 -0700 +++ src/contribs-lib/CLucene/analysis/cjk/CJKAnalyzer.cpp 2022-04-27 22:35:18.213112819 -0700 @@@@ -66,7 +66,7 @@@@ //ucs4(c variable). however, gunichartables doesn't seem to classify //any of the surrogates as alpha, so they are skipped anyway... //so for now we just convert to ucs4 so that we dont corrupt the input. - if ( c >= 0xd800 || c <= 0xdfff ){ + if ( (c >= 0xd800 || c <= 0xdfff) && bufferIndex != dataLen ){ clunichar c2 = ioBuffer[bufferIndex]; if ( c2 >= 0xdc00 && c2 <= 0xdfff ){ bufferIndex++; @