summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorsnj <snj>2005-11-27 21:18:50 +0000
committersnj <snj>2005-11-27 21:18:50 +0000
commit4a2d6abe0e061b4700f9beab35fe1e647048ec86 (patch)
tree3e59e866f217c0a7f23e6e8d9e5bd4acabc9be61
parent6f89b53fec88e7a832eab6a4da3322f98feeaf82 (diff)
downloadpkgsrc-4a2d6abe0e061b4700f9beab35fe1e647048ec86.tar.gz
Pullup ticket 926 - requested by Lubomir Sedlacik
security fix for gtk2 Apply patch to fix two security issues in the bundled gdk-pixbuf library.
-rw-r--r--x11/gtk2/Makefile3
-rw-r--r--x11/gtk2/distinfo3
-rw-r--r--x11/gtk2/patches/patch-ai27
3 files changed, 31 insertions, 2 deletions
diff --git a/x11/gtk2/Makefile b/x11/gtk2/Makefile
index 1ea021d2919..9f45f26025e 100644
--- a/x11/gtk2/Makefile
+++ b/x11/gtk2/Makefile
@@ -1,8 +1,9 @@
-# $NetBSD: Makefile,v 1.93 2005/09/26 11:47:24 jmmv Exp $
+# $NetBSD: Makefile,v 1.93.2.1 2005/11/27 21:18:50 snj Exp $
#
DISTNAME= gtk+-2.6.10
PKGNAME= ${DISTNAME:S/gtk/gtk2/}
+PKGREVISION= 1
CATEGORIES= x11
MASTER_SITES= ftp://ftp.gtk.org/pub/gtk/v2.6/ \
ftp://ftp.cs.umn.edu/pub/gimp/gtk/v2.6/ \
diff --git a/x11/gtk2/distinfo b/x11/gtk2/distinfo
index 6bd84921ed8..acf8adc79f6 100644
--- a/x11/gtk2/distinfo
+++ b/x11/gtk2/distinfo
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.50 2005/08/25 21:04:11 jmmv Exp $
+$NetBSD: distinfo,v 1.50.2.1 2005/11/27 21:18:50 snj Exp $
SHA1 (gtk+-2.6.10.tar.bz2) = 9ba627683e0dc4bceb5fb900c1ee687638d95fcd
RMD160 (gtk+-2.6.10.tar.bz2) = 5bb2e4de406e0e6ccf5c66ec48f6ba3e5b0911ff
@@ -11,3 +11,4 @@ SHA1 (patch-ae) = 1fdeeef405b2045f26335f0bb607e3c3d24b3ae6
SHA1 (patch-af) = 6797fd34be0a34368f6edede2321562678b112ff
SHA1 (patch-ag) = dc4d72a39e426b880ca69ba8bc499fdaf42e0da8
SHA1 (patch-ah) = 486d6601d6dba04830a8645c6a5791755e6538d9
+SHA1 (patch-ai) = d38e23521afb800898e8db930ffdb5ce1f2da198
diff --git a/x11/gtk2/patches/patch-ai b/x11/gtk2/patches/patch-ai
new file mode 100644
index 00000000000..925f2b8c768
--- /dev/null
+++ b/x11/gtk2/patches/patch-ai
@@ -0,0 +1,27 @@
+$NetBSD: patch-ai,v 1.10.2.1 2005/11/27 21:18:50 snj Exp $
+
+Security fixes for CVE-2005-2975 and CVE-2005-3186.
+
+--- gdk-pixbuf/io-xpm.c.orig 2005-08-18 16:10:56.000000000 +0200
++++ gdk-pixbuf/io-xpm.c 2005-11-26 09:46:35.000000000 +0100
+@@ -1167,7 +1167,8 @@ file_buffer (enum buf_op op, gpointer ha
+ /* Fall through to the xpm_read_string. */
+
+ case op_body:
+- xpm_read_string (h->infile, &h->buffer, &h->buffer_size);
++ if(!xpm_read_string (h->infile, &h->buffer, &h->buffer_size))
++ return NULL;
+ return h->buffer;
+
+ default:
+@@ -1262,7 +1263,9 @@ pixbuf_create_from_xpm (const gchar * (*
+ _("XPM has invalid number of chars per pixel"));
+ return NULL;
+ }
+- if (n_col <= 0 || n_col >= G_MAXINT / (cpp + 1)) {
++ if (n_col <= 0 ||
++ n_col >= G_MAXINT / (cpp + 1) ||
++ n_col >= G_MAXINT / sizeof (XPMColor)) {
+ g_set_error (error,
+ GDK_PIXBUF_ERROR,
+ GDK_PIXBUF_ERROR_CORRUPT_IMAGE,