diff options
author | taca <taca> | 2010-02-16 17:33:39 +0000 |
---|---|---|
committer | taca <taca> | 2010-02-16 17:33:39 +0000 |
commit | 732177a6021661b3b30e834964726d49748d385e (patch) | |
tree | 73a1265488b4d285264b858d2fcb43ce2a6b6b67 /x11 | |
parent | d399ea2495a0375bf433c8737a1379a9f1dd205d (diff) | |
download | pkgsrc-732177a6021661b3b30e834964726d49748d385e.tar.gz |
Add patches for CVE-2009-2625 and CVE-2009-2369.
Bump PKGREVISION.
Diffstat (limited to 'x11')
-rw-r--r-- | x11/wxGTK24/Makefile | 4 | ||||
-rw-r--r-- | x11/wxGTK24/distinfo | 6 | ||||
-rw-r--r-- | x11/wxGTK24/patches/patch-am | 15 | ||||
-rw-r--r-- | x11/wxGTK24/patches/patch-an | 17 | ||||
-rw-r--r-- | x11/wxGTK24/patches/patch-ao | 28 | ||||
-rw-r--r-- | x11/wxGTK24/patches/patch-ap | 35 |
6 files changed, 102 insertions, 3 deletions
diff --git a/x11/wxGTK24/Makefile b/x11/wxGTK24/Makefile index ef61da52ab7..398ffc9aa35 100644 --- a/x11/wxGTK24/Makefile +++ b/x11/wxGTK24/Makefile @@ -1,11 +1,11 @@ -# $NetBSD: Makefile,v 1.10 2010/01/18 09:59:45 wiz Exp $ +# $NetBSD: Makefile,v 1.11 2010/02/16 17:33:39 taca Exp $ # PKG_DESTDIR_SUPPORT= user-destdir .include "Makefile.common" -PKGREVISION= 15 +PKGREVISION= 16 COMMENT= GTK-based implementation of the wxWidgets GUI library CONFLICTS+= wxGTK<=2.4.2nb5 diff --git a/x11/wxGTK24/distinfo b/x11/wxGTK24/distinfo index bc7972ef9ba..c13939e0045 100644 --- a/x11/wxGTK24/distinfo +++ b/x11/wxGTK24/distinfo @@ -1,4 +1,4 @@ -$NetBSD: distinfo,v 1.9 2009/11/29 20:16:20 joerg Exp $ +$NetBSD: distinfo,v 1.10 2010/02/16 17:33:39 taca Exp $ SHA1 (wxGTK-2.4.2.tar.bz2) = 3f1ebacaaf8eb5510c14ee10bafbc5f225be842c RMD160 (wxGTK-2.4.2.tar.bz2) = 8076d1ba31c9b23becb241cbad5a83763fee776e @@ -15,3 +15,7 @@ SHA1 (patch-ai) = c5d301c2cb45397329d9a817d9278707a2d3b97f SHA1 (patch-aj) = 9f74442617e6a869c5ff253591bba3f9da3a9e0c SHA1 (patch-ak) = 3f26086c8f16ac972db89c21f665c187570937cc SHA1 (patch-al) = bceed88db708c83afca0fe3adb5c923f9bc661b0 +SHA1 (patch-am) = 445ae223a6fd88b86efafa7c13dbcf3f359f364f +SHA1 (patch-an) = a9d276244cac87fa00a3c3338179e68084b72b1d +SHA1 (patch-ao) = 7fb559c8662b20a61d39b308d3b6723b0dde6673 +SHA1 (patch-ap) = b1217506bfffe9ed7a282c960a99921c61d76dbd diff --git a/x11/wxGTK24/patches/patch-am b/x11/wxGTK24/patches/patch-am new file mode 100644 index 00000000000..c5ae570d226 --- /dev/null +++ b/x11/wxGTK24/patches/patch-am @@ -0,0 +1,15 @@ +$NetBSD: patch-am,v 1.1 2010/02/16 17:33:39 taca Exp $ + +deal with CVE-2009-2625. + +--- contrib/src/xrc/expat/xmltok/xmltok_impl.c.orig 2003-09-21 11:32:55.000000000 +0000 ++++ contrib/src/xrc/expat/xmltok/xmltok_impl.c +@@ -1753,7 +1753,7 @@ void PREFIX(updatePosition)(const ENCODI + const char *end, + POSITION *pos) + { +- while (ptr != end) { ++ while (ptr < end) { + switch (BYTE_TYPE(enc, ptr)) { + #define LEAD_CASE(n) \ + case BT_LEAD ## n: \ diff --git a/x11/wxGTK24/patches/patch-an b/x11/wxGTK24/patches/patch-an new file mode 100644 index 00000000000..7725889abac --- /dev/null +++ b/x11/wxGTK24/patches/patch-an @@ -0,0 +1,17 @@ +$NetBSD: patch-an,v 1.1 2010/02/16 17:33:39 taca Exp $ + +deal with CVE-2009-2369. + +--- src/common/image.cpp.orig 2003-09-21 11:31:39.000000000 +0000 ++++ src/common/image.cpp +@@ -147,6 +147,10 @@ void wxImage::Create( int width, int hei + + m_refData = new wxImageRefData(); + ++ if (width <= 0 || height <= 0 || width > INT_MAX / 3 / height) { ++ UnRef(); ++ return; ++ } + M_IMGDATA->m_data = (unsigned char *) malloc( width*height*3 ); + if (M_IMGDATA->m_data) + { diff --git a/x11/wxGTK24/patches/patch-ao b/x11/wxGTK24/patches/patch-ao new file mode 100644 index 00000000000..c6aabd03277 --- /dev/null +++ b/x11/wxGTK24/patches/patch-ao @@ -0,0 +1,28 @@ +$NetBSD: patch-ao,v 1.1 2010/02/16 17:33:39 taca Exp $ + +deal with CVE-2009-2369. + +--- src/common/imagpng.cpp.orig 2003-09-21 11:31:39.000000000 +0000 ++++ src/common/imagpng.cpp +@@ -213,18 +213,16 @@ bool wxPNGHandler::LoadFile( wxImage *im + if (!image->Ok()) + goto error_nolines; + +- lines = (unsigned char **)malloc( (size_t)(height * sizeof(unsigned char *)) ); ++ // initialize all line pointers to NULL to ensure that they can be safely ++ // free()d if an error occurs before all of them could be allocated ++ lines = (unsigned char **)calloc(height, sizeof(unsigned char *)); + if (lines == NULL) + goto error_nolines; + + for (i = 0; i < height; i++) + { + if ((lines[i] = (unsigned char *)malloc( (size_t)(width * (sizeof(unsigned char) * 4)))) == NULL) +- { +- for ( unsigned int n = 0; n < i; n++ ) +- free( lines[n] ); + goto error; +- } + } + + // loaded successfully! diff --git a/x11/wxGTK24/patches/patch-ap b/x11/wxGTK24/patches/patch-ap new file mode 100644 index 00000000000..2dc7c5738f2 --- /dev/null +++ b/x11/wxGTK24/patches/patch-ap @@ -0,0 +1,35 @@ +$NetBSD: patch-ap,v 1.1 2010/02/16 17:33:39 taca Exp $ + +deal with CVE-2009-2369. + +--- src/common/imagtiff.cpp.orig 2003-09-21 11:31:39.000000000 +0000 ++++ src/common/imagtiff.cpp +@@ -188,15 +188,25 @@ bool wxTIFFHandler::LoadFile( wxImage *i + } + + uint32 w, h; +- uint32 npixels; + uint32 *raster; + + TIFFGetField( tif, TIFFTAG_IMAGEWIDTH, &w ); + TIFFGetField( tif, TIFFTAG_IMAGELENGTH, &h ); + +- npixels = w * h; ++ // guard against integer overflow during multiplication which could result ++ // in allocating a too small buffer and then overflowing it ++ const double bytesNeeded = (double)w * (double)h * sizeof(uint32); ++ if ( bytesNeeded >= 4294967295U /* UINT32_MAX */ ) ++ { ++ if ( verbose ) ++ wxLogError( _("TIFF: Image size is abnormally big.") ); ++ ++ TIFFClose(tif); ++ ++ return false; ++ } + +- raster = (uint32*) _TIFFmalloc( npixels * sizeof(uint32) ); ++ raster = (uint32*) _TIFFmalloc( bytesNeeded ); + + if (!raster) + { |