aboutsummaryrefslogtreecommitdiffstats
path: root/graphics/xpdf/files
diff options
context:
space:
mode:
authordelphij <delphij@FreeBSD.org>2007-11-13 09:14:28 +0800
committerdelphij <delphij@FreeBSD.org>2007-11-13 09:14:28 +0800
commit41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08 (patch)
tree5552a468604a3f56bce0be8bf6b5980eed3e4370 /graphics/xpdf/files
parent9d8f7186b663e04a69039647ca438c70373a20e8 (diff)
downloadfreebsd-ports-gnome-41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08.tar.gz
freebsd-ports-gnome-41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08.tar.zst
freebsd-ports-gnome-41d6ce7b86f62d7a73bf95cb0b31b419ccf7ca08.zip
Apply xpdf 3.02pl2 patch for CVE-2007-4352, CVE-2007-5392, CVE-2007-5393;
while I am there, rework on the way of applying xpdf 3.02pl1 patch to ease future upgrade. Approved by: portmgr (linimon) Security: 2747fc39-915b-11dc-9239-001c2514716c
Diffstat (limited to 'graphics/xpdf/files')
-rw-r--r--graphics/xpdf/files/patch-CVE-2007-338733
1 files changed, 0 insertions, 33 deletions
diff --git a/graphics/xpdf/files/patch-CVE-2007-3387 b/graphics/xpdf/files/patch-CVE-2007-3387
deleted file mode 100644
index 692d243ab949..000000000000
--- a/graphics/xpdf/files/patch-CVE-2007-3387
+++ /dev/null
@@ -1,33 +0,0 @@
-*** xpdf/Stream.cc Tue Feb 27 14:05:52 2007
---- xpdf/Stream.cc Thu Jul 26 14:44:43 2007
-***************
-*** 410,424 ****
- ok = gFalse;
-
- nVals = width * nComps;
-- if (width <= 0 || nComps <= 0 || nBits <= 0 ||
-- nComps >= INT_MAX / nBits ||
-- width >= INT_MAX / nComps / nBits ||
-- nVals * nBits + 7 < 0) {
-- return;
-- }
- pixBytes = (nComps * nBits + 7) >> 3;
- rowBytes = ((nVals * nBits + 7) >> 3) + pixBytes;
-! if (rowBytes <= 0) {
- return;
- }
- predLine = (Guchar *)gmalloc(rowBytes);
---- 410,422 ----
- ok = gFalse;
-
- nVals = width * nComps;
- pixBytes = (nComps * nBits + 7) >> 3;
- rowBytes = ((nVals * nBits + 7) >> 3) + pixBytes;
-! if (width <= 0 || nComps <= 0 || nBits <= 0 ||
-! nComps > gfxColorMaxComps ||
-! nBits > 16 ||
-! width >= INT_MAX / nComps || // check for overflow in nVals
-! nVals >= (INT_MAX - 7) / nBits) { // check for overflow in rowBytes
- return;
- }
- predLine = (Guchar *)gmalloc(rowBytes);