OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Michael Schloh
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-src                      Date:   11-Aug-2004 17:06:38
  Branch: HEAD                             Handle: 2004081116063700

  Modified files:
    openpkg-src/qt          qt.patch qt.spec

  Log:
    upgrading package: qt 3.3.2 -> 3.3.3

  Summary:
    Revision    Changes     Path
    1.8         +71 -71     openpkg-src/qt/qt.patch
    1.110       +8  -8      openpkg-src/qt/qt.spec
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-src/qt/qt.patch
  ============================================================================
  $ cvs diff -u -r1.7 -r1.8 qt.patch
  --- openpkg-src/qt/qt.patch   4 Aug 2004 14:01:55 -0000       1.7
  +++ openpkg-src/qt/qt.patch   11 Aug 2004 15:06:37 -0000      1.8
  @@ -1,7 +1,7 @@
   Index: configure
  ---- configure        2004-02-11 11:21:42.000000000 +0100
  -+++ configure        2004-03-03 12:16:46.847102980 +0100
  -@@ -1754,21 +1754,6 @@
  +--- configure.orig   2004-06-14 11:18:55 +0200
  ++++ configure        2004-08-11 16:13:39 +0200
  +@@ -1782,21 +1782,6 @@
            CFG_FREETYPE=yes
        fi
        fi
  @@ -23,7 +23,7 @@
        # auto-detect Session Management support
        if [ "$CFG_SM" = "auto" ]; then
        if $x11tests/sm.test $XQMAKESPEC $OPT_VERBOSE $L_FLAGS $I_FLAGS; then
  -@@ -2878,6 +2863,21 @@
  +@@ -2926,6 +2911,21 @@
        if [ "$CFG_XKB" = "yes" ]; then
            QMAKE_CONFIG="$QMAKE_CONFIG xkb"
        fi
  @@ -45,9 +45,9 @@
    elif [ "$PLATFORM_MAC" = "yes" ]; then
        if [ "$CFG_TABLET" = "yes" ]; then
        QMAKE_CONFIG="$QMAKE_CONFIG tablet"
  -Index: config.tests/x11/xfreetype.test
  ---- config.tests/x11/xfreetype.test  2004-03-03 10:41:51.522773000 +0100
  -+++ config.tests/x11/xfreetype.test  2004-03-03 10:43:42.588911196 +0100
  +Index: config.test/x11/xfreetype.test
  +--- config.tests/x11/xfreetype.test.orig     2003-12-08 10:04:06 +0100
  ++++ config.tests/x11/xfreetype.test  2004-08-11 16:14:43 +0200
   @@ -56,7 +56,7 @@
        XFT=no
        [ "$VERBOSE" = "yes" ] && echo "  Could not find Xft lib anywhere in $LIBDIRS"
  @@ -68,7 +68,7 @@
    
   Index: src/3rdparty/libpng/pngconf.h
   --- src/3rdparty/libpng/pngconf.h.orig       2003-05-27 17:19:23 +0200
  -+++ src/3rdparty/libpng/pngconf.h    2004-07-02 09:22:17 +0200
  ++++ src/3rdparty/libpng/pngconf.h    2004-08-11 16:18:06 +0200
   @@ -251,10 +251,6 @@
    #      define PNG_SAVE_BSD_SOURCE
    #      undef _BSD_SOURCE
  @@ -82,7 +82,7 @@
       /* include setjmp.h for error handling */
   Index: src/3rdparty/libpng/pngerror.c
   --- src/3rdparty/libpng/pngerror.c.orig      2003-05-27 17:19:23 +0200
  -+++ src/3rdparty/libpng/pngerror.c   2004-07-02 09:22:17 +0200
  ++++ src/3rdparty/libpng/pngerror.c   2004-08-11 16:19:27 +0200
   @@ -135,10 +135,13 @@
          buffer[iout] = 0;
       else
  @@ -101,7 +101,7 @@
    
   Index: src/3rdparty/libpng/pngrtran.c
   --- src/3rdparty/libpng/pngrtran.c.orig      2003-05-27 17:19:23 +0200
  -+++ src/3rdparty/libpng/pngrtran.c   2004-07-02 09:22:17 +0200
  ++++ src/3rdparty/libpng/pngrtran.c   2004-08-11 16:26:04 +0200
   @@ -1889,8 +1889,8 @@
             /* This changes the data from GG to GGXX */
             if (flags & PNG_FLAG_FILLER_AFTER)
  @@ -169,14 +169,14 @@
       Use to patch libpng-1.0.9 through 1.2.5
       This fixes the most dangerous of the newly reported vulnerabilities
   
  -diff -r -U 3 libpng-1.2.5/pngrutil.c libpng-1.2.5patch03/pngrutil.c
  ---- src/3rdparty/libpng/pngrutil.c.orig      Thu Oct  3 06:32:30 2002
  -+++ src/3rdparty/libpng/pngrutil.c   Fri Jul 23 18:54:36 2004
  +Index: src/3rdparty/libpng/pngrutil.c
  +--- src/3rdparty/libpng/pngrutil.c.orig      2004-08-11 16:29:37 +0200
  ++++ src/3rdparty/libpng/pngrutil.c   2004-08-11 16:30:11 +0200
   @@ -1241,7 +1241,8 @@
             /* Should be an error, but we can cope with it */
             png_warning(png_ptr, "Missing PLTE before tRNS");
          }
  --      else if (length > (png_uint_32)png_ptr->num_palette)
  +-      if (length > (png_uint_32)png_ptr->num_palette)
   +      if (length > (png_uint_32)png_ptr->num_palette ||
   +          length > PNG_MAX_PALETTE_LENGTH)
          {
  @@ -188,9 +188,9 @@
       This patch defines PNG_UINT_31_MAX, PNG_UINT_32_MAX, PNG_SIZE_MAX,
       and png_get_uint_31(), which are needed by patches 05-08.
   
  -diff -r -U 3 libpng-1.2.5/png.h libpng-1.2.5patch04/png.h
  ---- src/3rdparty/libpng/png.h.orig   Thu Oct  3 06:32:26 2002
  -+++ src/3rdparty/libpng/png.h        Fri Jul 23 18:56:27 2004
  +Index: src/3rdparty/libpng/png.h
  +--- src/3rdparty/libpng/png.h.orig   2003-05-27 17:19:23 +0200
  ++++ src/3rdparty/libpng/png.h        2004-08-11 16:31:06 +0200
   @@ -833,7 +833,11 @@
    typedef png_info FAR * FAR * png_infopp;
    
  @@ -213,9 +213,9 @@
    
    /* Initialize png_ptr struct for reading, and allocate any other memory.
     * (old interface - DEPRECATED - use png_create_read_struct instead).
  -diff -r -U 3 libpng-1.2.5/pngrutil.c libpng-1.2.5patch04/pngrutil.c
  ---- src/3rdparty/libpng/pngrutil.c.orig      Thu Oct  3 06:32:30 2002
  -+++ src/3rdparty/libpng/pngrutil.c   Fri Jul 23 18:56:27 2004
  +Index: src/3rdparty/libpng/pngrutil.c
  +--- src/3rdparty/libpng/pngrutil.c.orig      2004-08-11 16:29:37 +0200
  ++++ src/3rdparty/libpng/pngrutil.c   2004-08-11 16:32:11 +0200
   @@ -38,6 +38,14 @@
    #  endif
    #endif
  @@ -236,9 +236,9 @@
       Use to patch libpng-1.0.0 through 1.2.5
       Requires one of libpng-patch04*
   
  -diff -r -U 3 libpng-1.2.5/pngpread.c libpng-1.2.5patch05/pngpread.c
  ---- src/3rdparty/libpng/pngpread.c.orig      Thu Oct  3 06:32:28 2002
  -+++ src/3rdparty/libpng/pngpread.c   Fri Jul 23 18:57:39 2004
  +Index: src/3rdparty/libpng/pngpread.c
  +--- src/3rdparty/libpng/pngpread.c.orig      2003-05-27 17:19:23 +0200
  ++++ src/3rdparty/libpng/pngpread.c   2004-08-11 16:34:45 +0200
   @@ -208,7 +208,7 @@
          }
    
  @@ -275,9 +275,9 @@
       Use to patch libpng-1.0.13 through 1.0.15 and 1.2.2 through 1.2.5.
       Requires libpng-patch04-*
   
  -diff -r -U 3 libpng-1.2.5/pngread.c libpng-1.2.5patch06/pngread.c
  ---- src/3rdparty/libpng/pngread.c.orig       Thu Oct  3 06:32:29 2002
  -+++ src/3rdparty/libpng/pngread.c    Fri Jul 23 18:59:57 2004
  +Index: src/3rdparty/libpng/pngpread.c
  +--- src/3rdparty/libpng/pngread.c.orig       2003-05-27 17:19:23 +0200
  ++++ src/3rdparty/libpng/pngread.c    2004-08-11 16:36:04 +0200
   @@ -384,7 +384,7 @@
          png_uint_32 length;
    
  @@ -309,7 +309,7 @@
    
                png_reset_crc(png_ptr);
                png_crc_read(png_ptr, png_ptr->chunk_name, 4);
  -@@ -946,15 +940,12 @@
  +@@ -946,16 +940,13 @@
    #endif /* PNG_GLOBAL_ARRAYS */
    
          png_read_data(png_ptr, chunk_length, 4);
  @@ -320,21 +320,22 @@
          png_crc_read(png_ptr, png_ptr->chunk_name, 4);
    
          png_debug1(0, "Reading %s chunk.\n", png_ptr->chunk_name);
  --
  + 
   -      if (length > PNG_MAX_UINT)
   -         png_error(png_ptr, "Invalid chunk length.");
  - 
  +-
          if (!png_memcmp(png_ptr->chunk_name, png_IHDR, 4))
             png_handle_IHDR(png_ptr, info_ptr, length);
  +       else if (!png_memcmp(png_ptr->chunk_name, png_IEND, 4))
   
   
http://www.graphicsmagick.org/libpng/beta/patches/libpng-patch07-png-read-png-overflow.txt
       Use to patch libpng-1.0.6 through 1.2.5. Libpng-1.0.5 and earlier didn't 
implement png_read_png().
       Requires libpng-patch04-*
  -  
  -diff -r -U 3 libpng-1.2.5/pngread.c libpng-1.2.5patch07/pngread.c
  ---- src/3rdparty/libpng/pngread.c.orig       Thu Oct  3 06:32:29 2002
  -+++ src/3rdparty/libpng/pngread.c    Fri Jul 23 19:01:39 2004
  -@@ -1299,6 +1299,9 @@
  +
  +Index: src/3rdparty/libpng/pngread.c
  +--- src/3rdparty/libpng/pngread.c.orig       2004-08-11 16:36:04 +0200
  ++++ src/3rdparty/libpng/pngread.c    2004-08-11 16:37:39 +0200
  +@@ -1290,6 +1290,9 @@
        */
       png_read_info(png_ptr, info_ptr);
    
  @@ -351,10 +352,10 @@
   
   The "sPLT chunk too long" check from Matthias Clasen (RedHat libpng package 
maintainer)
   
  -diff -r -U 3 libpng-1.2.5/pngrutil.c libpng-1.2.5patch08/pngrutil.c
  ---- src/3rdparty/libpng/pngrutil.c.orig      Thu Oct  3 06:32:30 2002
  -+++ src/3rdparty/libpng/pngrutil.c   Fri Jul 23 19:02:48 2004
  -@@ -1154,8 +1154,18 @@
  +Index: src/3rdparty/libpng/pngrutil.c
  +--- src/3rdparty/libpng/pngrutil.c.orig      2004-08-05 15:27:41 +0200
  ++++ src/3rdparty/libpng/pngrutil.c   2004-08-11 16:38:53 +0200
  +@@ -1154,8 +1162,18 @@
       }
    
       new_palette.nentries = data_length / entry_size;
  @@ -379,10 +380,10 @@
       Use to patch libpng-1.0.9 through 1.2.5. Does not work with libpng-1.0.6-1.0.8.
       Libpng-1.0.5 and earlier didn't implement iCCP chunk reading.
   
  -diff -r -U 3 libpng-1.2.5/pngrutil.c libpng-1.2.5patch09/pngrutil.c
  ---- src/3rdparty/libpng/pngrutil.c.orig      Thu Oct  3 06:32:30 2002
  -+++ src/3rdparty/libpng/pngrutil.c   Fri Jul 23 19:04:28 2004
  -@@ -977,8 +977,7 @@
  +Index: src/3rdparty/libpng/pngrutil.c
  +--- src/3rdparty/libpng/pngrutil.c.orig      2004-08-05 15:27:41 +0200
  ++++ src/3rdparty/libpng/pngrutil.c   2004-08-11 16:40:46 +0200
  +@@ -977,8 +985,7 @@
       png_bytep pC;
       png_charp profile;
       png_uint_32 skip = 0;
  @@ -399,10 +400,10 @@
       03, but the only effect is that libpng will fail to detect misplaced
       harmless duplicate chunks.
   
  -diff -r -U 3 libpng-1.2.5/pngrutil.c libpng-1.2.5patch10/pngrutil.c
  ---- src/3rdparty/libpng/pngrutil.c.orig      Thu Oct  3 06:32:30 2002
  -+++ src/3rdparty/libpng/pngrutil.c   Fri Jul 23 19:05:40 2004
  -@@ -579,7 +579,7 @@
  +Index: src/3rdparty/libpng/pngrutil.c
  +--- src/3rdparty/libpng/pngrutil.c.orig      2004-08-11 16:40:46 +0200
  ++++ src/3rdparty/libpng/pngrutil.c   2004-08-11 16:42:31 +0200
  +@@ -587,7 +587,7 @@
          /* Should be an error, but we can cope with it */
          png_warning(png_ptr, "Out of place gAMA chunk");
    
  @@ -411,7 +412,7 @@
    #if defined(PNG_READ_sRGB_SUPPORTED)
          && !(info_ptr->valid & PNG_INFO_sRGB)
    #endif
  -@@ -660,7 +660,7 @@
  +@@ -668,7 +668,7 @@
          /* Should be an error, but we can cope with it */
          png_warning(png_ptr, "Out of place sBIT chunk");
       }
  @@ -420,7 +421,7 @@
       {
          png_warning(png_ptr, "Duplicate sBIT chunk");
          png_crc_finish(png_ptr, length);
  -@@ -729,7 +729,7 @@
  +@@ -737,7 +737,7 @@
          /* Should be an error, but we can cope with it */
          png_warning(png_ptr, "Missing PLTE before cHRM");
    
  @@ -429,7 +430,7 @@
    #if defined(PNG_READ_sRGB_SUPPORTED)
          && !(info_ptr->valid & PNG_INFO_sRGB)
    #endif
  -@@ -891,7 +891,7 @@
  +@@ -899,7 +899,7 @@
          /* Should be an error, but we can cope with it */
          png_warning(png_ptr, "Out of place sRGB chunk");
    
  @@ -438,7 +439,7 @@
       {
          png_warning(png_ptr, "Duplicate sRGB chunk");
          png_crc_finish(png_ptr, length);
  -@@ -995,7 +995,7 @@
  +@@ -1002,7 +1002,7 @@
          /* Should be an error, but we can cope with it */
          png_warning(png_ptr, "Out of place iCCP chunk");
    
  @@ -453,25 +454,25 @@
   It causes the reader to reject any images claiming to have more rows or
   columns the png format supports.
   
  -diff -ru libpng-1.2.5/png.h libpng-1.2.5.fix/png.h
  ---- src/3rdparty/libpng/png.h.orig   2002-10-03 12:32:26.000000000 +0100
  -+++ src/3rdparty/libpng/png.h        2004-07-13 23:18:10.000000000 +0100
  -@@ -835,6 +835,9 @@
  - /* Maximum positive integer used in PNG is (2^31)-1 */
  - #define PNG_MAX_UINT ((png_uint_32)0x7fffffffL)
  -
  +Index: src/3rdparty/libpng/png.h
  +--- src/3rdparty/libpng/png.h.orig   2004-08-11 16:31:06 +0200
  ++++ src/3rdparty/libpng/png.h        2004-08-11 16:44:14 +0200
  +@@ -839,6 +839,9 @@
  + /* PNG_MAX_UINT is deprecated; use PNG_UINT_31_MAX instead. */
  + #define PNG_MAX_UINT PNG_UINT_31_MAX
  + 
   +/* Constraints on width, height, (2 ^ 24) - 1*/
   +#define PNG_MAX_DIMENSION 16777215
   +
    /* These describe the color_type field in png_info. */
    /* color type masks */
    #define PNG_COLOR_MASK_PALETTE    1
  -diff -ru libpng-1.2.5/pngrutil.c libpng-1.2.5.fix/pngrutil.c
  ---- src/3rdparty/libpng/pngrutil.c.orig      2004-07-13 13:36:37.000000000 +0100
  -+++ src/3rdparty/libpng/pngrutil.c   2004-07-13 23:43:02.000000000 +0100
  -@@ -350,7 +350,11 @@
  +Index: src/3rdparty/libpng/pngrutil.c
  +--- src/3rdparty/libpng/pngrutil.c.orig      2004-08-11 16:42:31 +0200
  ++++ src/3rdparty/libpng/pngrutil.c   2004-08-11 16:45:38 +0200
  +@@ -355,7 +355,11 @@
       png_crc_finish(png_ptr, 0);
  -
  + 
       width = png_get_uint_32(buf);
   +   if (width > PNG_MAX_DIMENSION)
   +      png_error(png_ptr, "Width is too large");
  @@ -481,28 +482,28 @@
       bit_depth = buf[8];
       color_type = buf[9];
       compression_type = buf[10];
  -@@ -675,7 +679,7 @@
  +@@ -680,7 +684,7 @@
       else
          truelen = (png_size_t)png_ptr->channels;
  -
  + 
   -   if (length != truelen)
   +   if (length != truelen || length > 4)
       {
          png_warning(png_ptr, "Incorrect sBIT chunk length");
          png_crc_finish(png_ptr, length);
  -@@ -1400,7 +1405,7 @@
  +@@ -1415,7 +1419,7 @@
    void /* PRIVATE */
    png_handle_hIST(png_structp png_ptr, png_infop info_ptr, png_uint_32 length)
    {
   -   int num, i;
   +   unsigned int num, i;
       png_uint_16 readbuf[PNG_MAX_PALETTE_LENGTH];
  -
  + 
       png_debug(1, "in png_handle_hIST\n");
  -@@ -1426,8 +1431,8 @@
  +@@ -1441,8 +1445,8 @@
          return;
       }
  -
  + 
   -   num = (int)length / 2 ;
   -   if (num != png_ptr->num_palette)
   +   num = length / 2 ;
  @@ -510,14 +511,13 @@
       {
          png_warning(png_ptr, "Incorrect hIST chunk length");
          png_crc_finish(png_ptr, length);
  -@@ -2868,6 +2873,9 @@
  +@@ -2883,6 +2887,9 @@
                   png_read_data(png_ptr, chunk_length, 4);
                   png_ptr->idat_size = png_get_uint_32(chunk_length);
  -
  + 
   +               if (png_ptr->idat_size > PNG_MAX_UINT)
   +                  png_error(png_ptr, "Invalid chunk length.");
   +
                   png_reset_crc(png_ptr);
                   png_crc_read(png_ptr, png_ptr->chunk_name, 4);
                   if (png_memcmp(png_ptr->chunk_name, (png_bytep)png_IDAT, 4))
  -
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/qt/qt.spec
  ============================================================================
  $ cvs diff -u -r1.109 -r1.110 qt.spec
  --- openpkg-src/qt/qt.spec    4 Aug 2004 14:01:55 -0000       1.109
  +++ openpkg-src/qt/qt.spec    11 Aug 2004 15:06:37 -0000      1.110
  @@ -33,8 +33,8 @@
   Class:        PLUS
   Group:        XWindow
   License:      GPL
  -Version:      3.3.2
  -Release:      20040804
  +Version:      3.3.3
  +Release:      20040811
   
   #   package library options (each 'yes' builds more libraries)
   %option       with_shared   no
  @@ -92,9 +92,7 @@
       #   avoid dependencies external to OpenPKG instance
       cp -rp mkspecs mkspecs.fresh
       %{l_shtool} subst \
  -        -e 's;[ \t]*-I/usr/local/include;;g' \
           -e 's;[ \t]*/usr/local/include;;g' \
  -        -e 's;[ \t]*-L/usr/local/lib;;g' \
           -e 's;[ \t]*/usr/local/lib;;g' \
           mkspecs/darwin-g++/qmake.conf \
           mkspecs/freebsd-g++/qmake.conf \
  @@ -104,12 +102,14 @@
   
       #   correctly detect OpenPKG xrender and xft installations
       %{l_shtool} subst \
  -        -e 's;INCDIRS=";INCDIRS="%{l_prefix}/include ;g' \
  -        -e 's;LIBDIRS=";LIBDIRS="%{l_prefix}/lib ;g' \
  -        -e 's;freetype2/freetype/;freetype/;g' \
  -        -e 's;freetype2;freetype;g' \
  +        -e 's;[^A-Za-z_]\(INCDIRS="\);\1%{l_prefix}/include ;g' \
  +        -e 's;[^A-Za-z_]\(LIBDIRS="\);\1%{l_prefix}/lib ;g' \
           config.tests/x11/xfreetype.test \
           config.tests/x11/xrender.test
  +    %{l_shtool} subst \
  +        -e 's;freetype2/freetype/;freetype/;g' \
  +        -e 's;freetype2;freetype;g' \
  +        config.tests/x11/xfreetype.test
   
       #   repair nonstandard posix thread test macro usage
       %{l_shtool} subst \
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to