diff options
author | delphij <delphij@FreeBSD.org> | 2007-11-13 09:14:28 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2007-11-13 09:14:28 +0800 |
commit | 41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08 (patch) | |
tree | 5552a468604a3f56bce0be8bf6b5980eed3e4370 /graphics/xpdf/files | |
parent | 9d8f7186b663e04a69039647ca438c70373a20e8 (diff) | |
download | freebsd-ports-gnome-41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08.tar.gz freebsd-ports-gnome-41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08.tar.zst freebsd-ports-gnome-41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08.zip |
Apply xpdf 3.02pl2 patch for CVE-2007-4352, CVE-2007-5392, CVE-2007-5393;
while I am there, rework on the way of applying xpdf 3.02pl1 patch to ease
future upgrade.
Approved by: portmgr (linimon)
Security: 2747fc39-915b-11dc-9239-001c2514716c
Diffstat (limited to 'graphics/xpdf/files')
-rw-r--r-- | graphics/xpdf/files/patch-CVE-2007-3387 | 33 |
1 files changed, 0 insertions, 33 deletions
diff --git a/graphics/xpdf/files/patch-CVE-2007-3387 b/graphics/xpdf/files/patch-CVE-2007-3387 deleted file mode 100644 index 692d243ab949..000000000000 --- a/graphics/xpdf/files/patch-CVE-2007-3387 +++ /dev/null @@ -1,33 +0,0 @@ -*** xpdf/Stream.cc Tue Feb 27 14:05:52 2007 ---- xpdf/Stream.cc Thu Jul 26 14:44:43 2007 -*************** -*** 410,424 **** - ok = gFalse; - - nVals = width * nComps; -- if (width <= 0 || nComps <= 0 || nBits <= 0 || -- nComps >= INT_MAX / nBits || -- width >= INT_MAX / nComps / nBits || -- nVals * nBits + 7 < 0) { -- return; -- } - pixBytes = (nComps * nBits + 7) >> 3; - rowBytes = ((nVals * nBits + 7) >> 3) + pixBytes; -! if (rowBytes <= 0) { - return; - } - predLine = (Guchar *)gmalloc(rowBytes); ---- 410,422 ---- - ok = gFalse; - - nVals = width * nComps; - pixBytes = (nComps * nBits + 7) >> 3; - rowBytes = ((nVals * nBits + 7) >> 3) + pixBytes; -! if (width <= 0 || nComps <= 0 || nBits <= 0 || -! nComps > gfxColorMaxComps || -! nBits > 16 || -! width >= INT_MAX / nComps || // check for overflow in nVals -! nVals >= (INT_MAX - 7) / nBits) { // check for overflow in rowBytes - return; - } - predLine = (Guchar *)gmalloc(rowBytes); |