summaryrefslogtreecommitdiff
path: root/print/ghostscript
diff options
context:
space:
mode:
authordrochner <drochner>2012-09-12 11:27:04 +0000
committerdrochner <drochner>2012-09-12 11:27:04 +0000
commit169a270efa38003a51fff5c9a5dcda0fea273609 (patch)
tree46bf7b8157b7ad11987a4b6ffe746f87e2fa582c /print/ghostscript
parenta8f3cafbd14d37f3dc0baae72fe1c99bf45f7ddd (diff)
downloadpkgsrc-169a270efa38003a51fff5c9a5dcda0fea273609.tar.gz
add patch from RedHat to fix integer overflow which can lead to
crashes or possible code injection (CVE-2012-4405) bump PKGREV
Diffstat (limited to 'print/ghostscript')
-rw-r--r--print/ghostscript/Makefile4
-rw-r--r--print/ghostscript/distinfo3
-rw-r--r--print/ghostscript/patches/patch-CVE-2012-440518
3 files changed, 22 insertions, 3 deletions
diff --git a/print/ghostscript/Makefile b/print/ghostscript/Makefile
index 10e1f1f96bd..0ad289568b3 100644
--- a/print/ghostscript/Makefile
+++ b/print/ghostscript/Makefile
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.86 2012/02/06 12:41:20 wiz Exp $
+# $NetBSD: Makefile,v 1.87 2012/09/12 11:27:04 drochner Exp $
DISTNAME= ghostscript-8.71
-PKGREVISION= 9
+PKGREVISION= 10
CATEGORIES= print
MASTER_SITES= ${MASTER_SITE_SOURCEFORGE:=ghostscript/}
MASTER_SITES+= http://ghostscript.com/releases/
diff --git a/print/ghostscript/distinfo b/print/ghostscript/distinfo
index 81d4ac99daa..6a14d7f966f 100644
--- a/print/ghostscript/distinfo
+++ b/print/ghostscript/distinfo
@@ -1,8 +1,9 @@
-$NetBSD: distinfo,v 1.37 2011/01/15 14:08:10 wiz Exp $
+$NetBSD: distinfo,v 1.38 2012/09/12 11:27:05 drochner Exp $
SHA1 (ghostscript-8.71.tar.gz) = 629299140f612fac32f6289be0904107dfd1b555
RMD160 (ghostscript-8.71.tar.gz) = efce74cf22cf99b2b1a145df466e79a86e3dfefb
Size (ghostscript-8.71.tar.gz) = 25240801 bytes
+SHA1 (patch-CVE-2012-4405) = 994d07c0d3e7daf206e4e93ffdeae1a44a457656
SHA1 (patch-aa) = 31f2107c474398a350916df6fe793a5920f81169
SHA1 (patch-ab) = 7a98cad37f94394f172bdac23f5dd73fb1f08006
SHA1 (patch-ac) = b1f71dc446f433be0b07b0511dc1028e8e3b77f3
diff --git a/print/ghostscript/patches/patch-CVE-2012-4405 b/print/ghostscript/patches/patch-CVE-2012-4405
new file mode 100644
index 00000000000..ff1acc8728d
--- /dev/null
+++ b/print/ghostscript/patches/patch-CVE-2012-4405
@@ -0,0 +1,18 @@
+$NetBSD: patch-CVE-2012-4405,v 1.1 2012/09/12 11:27:05 drochner Exp $
+
+from RedHat bug #854227
+
+--- icclib/icc.c.orig 2009-07-28 07:48:19.000000000 +0000
++++ icclib/icc.c
+@@ -5006,6 +5006,11 @@ static int icmLut_read(
+ p->clutPoints = read_UInt8Number(bp+10);
+
+ /* Sanity check */
++ if (p->inputChan < 1) {
++ sprintf(icp->err,"icmLut_read: No input channels!");
++ return icp->errc = 1;
++ }
++
+ if (p->inputChan > MAX_CHAN) {
+ sprintf(icp->err,"icmLut_read: Can't handle > %d input channels\n",MAX_CHAN);
+ return icp->errc = 1;