From 27470e1676e69455acf06ae25ebd42ebd5bdecdb Mon Sep 17 00:00:00 2001 From: Hiroki Sato Date: Sat, 22 Aug 2015 17:48:35 +0000 Subject: - Split ghostscript into X11-independent and -dependent parts: * print/ghostscript{7,8,9,9-agpl}-base Installs Ghostscript binary, libgs, and related files. These ports do not depend on X11 libraries (i.e. x11* devices are not available). USES=ghostscript will set dependency on one of them depending on GHOSTSCRIPT_DEFAULT. The default device is set to "display" or "bbox". * print/ghostscript{7,8,9,9-agpl}-x11 Installs a shared library which provides X11 support to the installed Ghostscript binaries. x11* devices will be enabled when the library is available. This depends on *-base (RUN_DEPENDS). USES=ghostscript:x11 will set dependency on one of them. - Fix integer overflow reported as CVE-2015-3228. - Update Uses/ghostscript.mk: * Add x11 keyword. nox11 keyword is now obsolete. * Use packagename in *_DEPENDS line to prevent relationship between -base and -x11 packages from being broken. - Fix x11/nox11 keyword and bump PORTREVISION in ports using USES=ghostscript to update dependency of pre-compiled packages. --- print/ghostscript7-x11/files/patch-src-zdict.c | 29 ++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 print/ghostscript7-x11/files/patch-src-zdict.c (limited to 'print/ghostscript7-x11/files/patch-src-zdict.c') diff --git a/print/ghostscript7-x11/files/patch-src-zdict.c b/print/ghostscript7-x11/files/patch-src-zdict.c new file mode 100644 index 000000000000..050ecc841717 --- /dev/null +++ b/print/ghostscript7-x11/files/patch-src-zdict.c @@ -0,0 +1,29 @@ +--- src/zdict.c.orig 2013-04-30 11:04:05.000000000 +0900 ++++ src/zdict.c 2013-04-30 11:04:34.000000000 +0900 +@@ -35,12 +35,9 @@ + os_ptr op = osp; + + check_type(*op, t_integer); +-#if arch_sizeof_int < arch_sizeof_long +- check_int_leu(*op, max_uint); +-#else + if (op->value.intval < 0) + return_error(e_rangecheck); +-#endif ++ + return dict_create((uint) op->value.intval, op); + } + +@@ -458,12 +455,8 @@ + check_type(*op1, t_dictionary); + check_dict_write(*op1); + check_type(*op, t_integer); +-#if arch_sizeof_int < arch_sizeof_long +- check_int_leu(*op, max_uint); +-#else + if (op->value.intval < 0) + return_error(e_rangecheck); +-#endif + new_size = (uint) op->value.intval; + if (dict_length(op - 1) > new_size) + return_error(e_dictfull); -- cgit v1.2.3