Update of /cvsroot/fink/dists/10.4/unstable/main/finkinfo/graphics
In directory sc8-pr-cvs17:/tmp/cvs-serv32546

Modified Files:
        gimp2.info libwmf.info 
Added Files:
        libwmf.patch 
Log Message:
Debian security patches for gimp2/libwmf, via Tomoaki Okayama.

Index: libwmf.info
===================================================================
RCS file: /cvsroot/fink/dists/10.4/unstable/main/finkinfo/graphics/libwmf.info,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- libwmf.info 14 Aug 2007 22:04:48 -0000      1.3
+++ libwmf.info 28 Aug 2007 18:39:32 -0000      1.4
@@ -1,6 +1,6 @@
 Package: libwmf
 Version: 0.2.8.2
-Revision: 6
+Revision: 7
 
 Source: mirror:sourceforge:wvware/%n-%v.tar.gz
 Source-MD5: 1e0422026dd392651f0b8641fa33599d
@@ -13,6 +13,9 @@
 
 
 SetCPPFLAGS: -I/usr/X11R6/include/freetype2
+
+Patch: %n.patch
+
 PatchScript: <<
 perl -pi.bak -e 's;io_wmf_la_LIBADD =;io_wmf_la_LIBADD = libwmflite.la;' 
src/Makefile.in
 perl -pi.bak -e 's;DESTDIR =;;' fonts/Makefile.in

--- NEW FILE: libwmf.patch ---
--- libwmf-0.2.8.3.orig/src/font.c
+++ libwmf-0.2.8.3/src/font.c
@@ -199,7 +199,7 @@
        unsigned int i = 0;
 
        while (font_data->cache[i].name)
-       {       if (strcmp (font_data->cache[i].path,entry->path) == 0) break;
+       {       if (strcmp (font_data->cache[i].name,entry->name) == 0) break;
                i++;
        }
 
@@ -422,7 +422,6 @@
 
        fontmap_data->FD.FI = 0;
 
-       if (API->flags & WMF_OPT_SYS_FONTS)
        {       if (API->flags & WMF_OPT_SYS_FONTMAP)
                {       wmf_ipa_font_map_xml 
(API,&(fontmap_data->FD),options->sys_fontmap_file);
                }
--- libwmf-0.2.8.3.orig/src/player.c
+++ libwmf-0.2.8.3/src/player.c
@@ -23,6 +23,7 @@
 
 #include <stdio.h>
 #include <stdlib.h>
+#include <stdint.h>
 #include <string.h>
 #include <math.h>
 
@@ -132,8 +133,14 @@
                }
        }
 
-/*     P->Parameters = (unsigned char*) wmf_malloc (API,(MAX_REC_SIZE(API)-3) 
* 2 * sizeof (unsigned char));
- */    P->Parameters = (unsigned char*) wmf_malloc (API,(MAX_REC_SIZE(API)  ) 
* 2 * sizeof (unsigned char));
+       if (MAX_REC_SIZE(API) > UINT32_MAX / 2)
+       {
+               API->err = wmf_E_InsMem;
+               WMF_DEBUG (API,"bailing...");
+               return (API->err);
+       }
+
+       P->Parameters = (unsigned char*) wmf_malloc (API,(MAX_REC_SIZE(API)  ) 
* 2 * sizeof (unsigned char));
 
        if (ERR (API))
        {       WMF_DEBUG (API,"bailing...");

Index: gimp2.info
===================================================================
RCS file: /cvsroot/fink/dists/10.4/unstable/main/finkinfo/graphics/gimp2.info,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -d -r1.11 -r1.12
--- gimp2.info  25 Jan 2007 19:01:20 -0000      1.11
+++ gimp2.info  28 Aug 2007 18:39:31 -0000      1.12
@@ -3,12 +3,14 @@
 Type: -svg (boolean), -noprint (boolean)
 
 Version: 2.0.6
-Revision: 1004
+Revision: 1005
 # This package has OS X version-specific differences!
 # Do not blindly copy 10.3 <-> 10.4
 
 Source: mirror:gimp:v2.0/gimp-%v.tar.bz2
 Source2: mirror:gimp:help/testing/gimp-help-2-0.5.tar.gz
+Source3: http://astrange.ithinksw.net/fink/gimp-2.2.13-1etch4-debian.tar.bz2
+Source4: http://paq.osdn.org.ua/~mike/tmp/gimp-2.2.8-ubuntu-CVE-2006-3404.patch
 Depends: %N-shlibs (= %v-%r)
 Conflicts: gimp2,gimp2-svg,gimp2-noprint,gimp2-svg-noprint
 Replaces: gimp2,gimp2-svg,gimp2-noprint,gimp2-svg-noprint
@@ -35,6 +37,8 @@
 <<
 Source-MD5: 632b9ec629ba7c48d292069c37a1a6c1 
 Source2-MD5: 4b10833a545842ee4436a75eea68fd42
+Source3-MD5: d855405d3fde6c453fe55fd3b1cab835
+Source4-MD5: c5f49173063c776b7d7a908ec0889b05
 SetCC: gcc -I%p/lib/fontconfig2/include -L%p/lib/fontconfig2/lib 
-I%p/lib/freetype219/include -L%p/lib/freetype219/lib
 SetLIBS: -liconv -lintl -lexpat
 SetLDFLAGS: -Wl,-search_paths_first
@@ -43,6 +47,25 @@
 
 PatchScript: <<
 #!/bin/sh -ev
+########## Security Fixes ##########
+# Fix buffer overflow in XCF parser, imported from Ubuntu.
+patch -p1 < ../gimp-2.2.8-ubuntu-CVE-2006-3404.patch
+
+# Fix stack overflow in sunras plugin
+sed s/set_colormap/set_cmap/ ../debian/patches/06_CVE-2007-2356.patch | patch 
-p1
+
+# Avoid conflict with 07_CVE-2006-4519-CVE-2007-2949.patch
+perl -pi.bak0 -e "s/\t/        /g"                      app/xcf/xcf-load.c
+sed   -i.bak0 -e '/total = count;/d' \
+              -e '/gint  bytes;/d' \
+              -e 's/guint total;/guint total = count;/' app/xcf/xcf-read.c
+perl -pi.bak1 -e "s/(bytes =.*)/gint  \1\n/"            app/xcf/xcf-read.c
+perl -pi.bak2 -e "s/break;/break;\n/"                   app/xcf/xcf-read.c
+
+# Fix multiple buffer overflows and integer overflows
+patch -p1 < ../debian/patches/07_CVE-2006-4519-CVE-2007-2949.patch
+########## Security Fixes ##########
+
 if [ "%type_raw[-svg]" != "-svg" ]; then
  sed 's;SVG = @SVG@;SVG = ;' < plug-ins/common/Makefile.in > tmp
  mv tmp plug-ins/common/Makefile.in


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
Fink-commits mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fink-commits

Reply via email to