aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2012-08-24 07:04:33 +0000
committerNatanael Copa <ncopa@alpinelinux.org>2012-08-24 07:06:45 +0000
commita12193390ba9fd51010a5f110c7e6fe282c6d751 (patch)
tree6989b86d919d1462087dafcef67b1bcf71cf36c1
parente71adbe3083f318ca1aa262ea60853451d8564bc (diff)
downloadalpine_aports-a12193390ba9fd51010a5f110c7e6fe282c6d751.tar.bz2
alpine_aports-a12193390ba9fd51010a5f110c7e6fe282c6d751.tar.xz
alpine_aports-a12193390ba9fd51010a5f110c7e6fe282c6d751.zip
main/gimp: upgrade to 2.8.2
-rw-r--r--main/gimp/APKBUILD8
-rw-r--r--main/gimp/CVE-2012-3236.patch38
2 files changed, 3 insertions, 43 deletions
diff --git a/main/gimp/APKBUILD b/main/gimp/APKBUILD
index 7f8be05442..734c1579e0 100644
--- a/main/gimp/APKBUILD
+++ b/main/gimp/APKBUILD
@@ -1,7 +1,7 @@
1# Maintainer: Natanael Copa <ncopa@alpinelinux.org> 1# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
2pkgname=gimp 2pkgname=gimp
3pkgver=2.8.0 3pkgver=2.8.2
4pkgrel=2 4pkgrel=0
5pkgdesc="GNU Image Manipulation Program" 5pkgdesc="GNU Image Manipulation Program"
6url="http://www.gimp.org/" 6url="http://www.gimp.org/"
7arch="all" 7arch="all"
@@ -12,7 +12,6 @@ makedepends="gtk+-dev libxpm-dev libxmu-dev librsvg-dev dbus-glib-dev
12install= 12install=
13subpackages="$pkgname-dev $pkgname-doc $pkgname-lang" 13subpackages="$pkgname-dev $pkgname-doc $pkgname-lang"
14source="ftp://ftp.$pkgname.org/pub/$pkgname/v${pkgver%.*}/$pkgname-$pkgver.tar.bz2 14source="ftp://ftp.$pkgname.org/pub/$pkgname/v${pkgver%.*}/$pkgname-$pkgver.tar.bz2
15 CVE-2012-3236.patch
16 " 15 "
17 16
18_builddir="${srcdir}/${pkgname}-${pkgver}" 17_builddir="${srcdir}/${pkgname}-${pkgver}"
@@ -52,5 +51,4 @@ package() {
52 find "$pkgdir" -name '*.la' -delete 51 find "$pkgdir" -name '*.la' -delete
53} 52}
54 53
55md5sums="28997d14055f15db063eb92e1c8a7ebb gimp-2.8.0.tar.bz2 54md5sums="b542138820ca3a41cbd63fc331907955 gimp-2.8.2.tar.bz2"
56e01ea100274dbf0557336167933e5404 CVE-2012-3236.patch"
diff --git a/main/gimp/CVE-2012-3236.patch b/main/gimp/CVE-2012-3236.patch
deleted file mode 100644
index f59d68ebff..0000000000
--- a/main/gimp/CVE-2012-3236.patch
+++ /dev/null
@@ -1,38 +0,0 @@
1From 0474376d234bc3d0901fd5e86f89d778a6473dd8 Mon Sep 17 00:00:00 2001
2From: Michael Natterer <mitch@gimp.org>
3Date: Wed, 06 Jun 2012 19:21:10 +0000
4Subject: Bug 676804 - file handling DoS for fit file format
5
6Apply patch from joe@reactionis.co.uk which fixes a buffer overflow on
7broken/malicious fits files.
8(cherry picked from commit ace45631595e8781a1420842582d67160097163c)
9---
10diff --git a/plug-ins/file-fits/fits-io.c b/plug-ins/file-fits/fits-io.c
11index 03d9652..ed77318 100644
12--- a/plug-ins/file-fits/fits-io.c
13+++ b/plug-ins/file-fits/fits-io.c
14@@ -1054,10 +1054,18 @@ static FITS_HDU_LIST *fits_decode_header (FITS_RECORD_LIST *hdr,
15 hdulist->used.simple = (strncmp (hdr->data, "SIMPLE ", 8) == 0);
16 hdulist->used.xtension = (strncmp (hdr->data, "XTENSION", 8) == 0);
17 if (hdulist->used.xtension)
18- {
19- fdat = fits_decode_card (fits_search_card (hdr, "XTENSION"), typ_fstring);
20- strcpy (hdulist->xtension, fdat->fstring);
21- }
22+ {
23+ fdat = fits_decode_card (fits_search_card (hdr, "XTENSION"), typ_fstring);
24+ if (fdat != NULL)
25+ {
26+ strcpy (hdulist->xtension, fdat->fstring);
27+ }
28+ else
29+ {
30+ strcpy (errmsg, "No valid XTENSION header found.");
31+ goto err_return;
32+ }
33+ }
34
35 FITS_DECODE_CARD (hdr, "NAXIS", fdat, typ_flong);
36 hdulist->naxis = fdat->flong;
37--
38cgit v0.9.0.2