summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorspz <spz>2009-04-17 21:43:51 +0000
committerspz <spz>2009-04-17 21:43:51 +0000
commit1fa1e4b0bb35ef9b717177a791dd8d6a4bad04a8 (patch)
tree094f52f113be04e25b2c3cb796a511af4d6ac735
parent69b6f3fca262c29751837823c2a573f34070ea6a (diff)
downloadpkgsrc-1fa1e4b0bb35ef9b717177a791dd8d6a4bad04a8.tar.gz
Pullup ticket 2738 - requested by tron
Security fix Revisions pulled up: - pkgsrc/graphics/ghostscript/Makefile 1.61 - pkgsrc/graphics/ghostscript/distinfo 1.23 - pkgsrc/graphics/ghostscript/patches/patch-aa 1.4 Module Name: pkgsrc Committed By: tron Date: Tue Apr 14 19:32:54 UTC 2009 Modified Files: pkgsrc/print/ghostscript: Makefile distinfo Added Files: pkgsrc/print/ghostscript/patches: patch-aa Log Message: Add patch for the security vulnerability reported in CVE-2009-0196 taken from Redhat's Bugzilla. To generate a diff of this commit: cvs rdiff -u -r1.60 -r1.61 pkgsrc/print/ghostscript/Makefile cvs rdiff -u -r1.22 -r1.23 pkgsrc/print/ghostscript/distinfo cvs rdiff -u -r0 -r1.4 pkgsrc/print/ghostscript/patches/patch-aa
-rw-r--r--print/ghostscript/Makefile4
-rw-r--r--print/ghostscript/distinfo3
-rw-r--r--print/ghostscript/patches/patch-aa24
3 files changed, 28 insertions, 3 deletions
diff --git a/print/ghostscript/Makefile b/print/ghostscript/Makefile
index c2970cdb5a5..83bae5140fc 100644
--- a/print/ghostscript/Makefile
+++ b/print/ghostscript/Makefile
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.60 2009/03/25 10:42:13 drochner Exp $
+# $NetBSD: Makefile,v 1.60.2.1 2009/04/17 21:43:51 spz Exp $
DISTNAME= ghostscript-8.64
-PKGREVISION= 1
+PKGREVISION= 2
CATEGORIES= print
MASTER_SITES= ${MASTER_SITE_SOURCEFORGE:=ghostscript/}
EXTRACT_SUFX= .tar.bz2
diff --git a/print/ghostscript/distinfo b/print/ghostscript/distinfo
index debf9cd7d9f..0e40a573bb1 100644
--- a/print/ghostscript/distinfo
+++ b/print/ghostscript/distinfo
@@ -1,8 +1,9 @@
-$NetBSD: distinfo,v 1.22 2009/03/25 10:42:13 drochner Exp $
+$NetBSD: distinfo,v 1.22.2.1 2009/04/17 21:43:51 spz Exp $
SHA1 (ghostscript-8.64.tar.bz2) = 4c2a6e04145428d35da73fbc4db9c66a75e336e0
RMD160 (ghostscript-8.64.tar.bz2) = 565134dcfe1e823b435c3761461c5eb394bd633c
Size (ghostscript-8.64.tar.bz2) = 16921504 bytes
+SHA1 (patch-aa) = 31d077502dba343c5834e5ee9fdb42102ef47668
SHA1 (patch-ab) = 7a98cad37f94394f172bdac23f5dd73fb1f08006
SHA1 (patch-ad) = 8b3b743b2d6405ea35bfb16970942ecd55702401
SHA1 (patch-ae) = 50335e72adebe95ab0cb5873d1c6dd00e971579a
diff --git a/print/ghostscript/patches/patch-aa b/print/ghostscript/patches/patch-aa
new file mode 100644
index 00000000000..822a8535739
--- /dev/null
+++ b/print/ghostscript/patches/patch-aa
@@ -0,0 +1,24 @@
+$NetBSD: patch-aa,v 1.4.2.2 2009/04/17 21:43:51 spz Exp $
+
+Patch for CVE-2009-0196 taken from Redhat's Bugzilla:
+
+https://bugzilla.redhat.com/attachment.cgi?id=337747
+
+--- jbig2dec/jbig2_symbol_dict.c.orig 2007-12-11 08:29:58.000000000 +0000
++++ jbig2dec/jbig2_symbol_dict.c 2009-04-14 20:19:01.000000000 +0100
+@@ -699,6 +699,15 @@
+ exrunlength = params->SDNUMEXSYMS;
+ else
+ code = jbig2_arith_int_decode(IAEX, as, &exrunlength);
++ if (exrunlength > params->SDNUMEXSYMS - j) {
++ jbig2_error(ctx, JBIG2_SEVERITY_FATAL, segment->number,
++ "runlength too large in export symbol table (%d > %d - %d)\n",
++ exrunlength, params->SDNUMEXSYMS, j);
++ jbig2_sd_release(ctx, SDEXSYMS);
++ /* skip to the cleanup code and return SDEXSYMS = NULL */
++ SDEXSYMS = NULL;
++ break;
++ }
+ for(k = 0; k < exrunlength; k++)
+ if (exflag) {
+ SDEXSYMS->glyphs[j++] = (i < m) ?