From 27470e1676e69455acf06ae25ebd42ebd5bdecdb Mon Sep 17 00:00:00 2001 From: Hiroki Sato Date: Sat, 22 Aug 2015 17:48:35 +0000 Subject: - Split ghostscript into X11-independent and -dependent parts: * print/ghostscript{7,8,9,9-agpl}-base Installs Ghostscript binary, libgs, and related files. These ports do not depend on X11 libraries (i.e. x11* devices are not available). USES=ghostscript will set dependency on one of them depending on GHOSTSCRIPT_DEFAULT. The default device is set to "display" or "bbox". * print/ghostscript{7,8,9,9-agpl}-x11 Installs a shared library which provides X11 support to the installed Ghostscript binaries. x11* devices will be enabled when the library is available. This depends on *-base (RUN_DEPENDS). USES=ghostscript:x11 will set dependency on one of them. - Fix integer overflow reported as CVE-2015-3228. - Update Uses/ghostscript.mk: * Add x11 keyword. nox11 keyword is now obsolete. * Use packagename in *_DEPENDS line to prevent relationship between -base and -x11 packages from being broken. - Fix x11/nox11 keyword and bump PORTREVISION in ports using USES=ghostscript to update dependency of pre-compiled packages. --- print/ghostscript7/files/patch-src-zdict.c | 29 ----------------------------- 1 file changed, 29 deletions(-) delete mode 100644 print/ghostscript7/files/patch-src-zdict.c (limited to 'print/ghostscript7/files/patch-src-zdict.c') diff --git a/print/ghostscript7/files/patch-src-zdict.c b/print/ghostscript7/files/patch-src-zdict.c deleted file mode 100644 index 050ecc841717..000000000000 --- a/print/ghostscript7/files/patch-src-zdict.c +++ /dev/null @@ -1,29 +0,0 @@ ---- src/zdict.c.orig 2013-04-30 11:04:05.000000000 +0900 -+++ src/zdict.c 2013-04-30 11:04:34.000000000 +0900 -@@ -35,12 +35,9 @@ - os_ptr op = osp; - - check_type(*op, t_integer); --#if arch_sizeof_int < arch_sizeof_long -- check_int_leu(*op, max_uint); --#else - if (op->value.intval < 0) - return_error(e_rangecheck); --#endif -+ - return dict_create((uint) op->value.intval, op); - } - -@@ -458,12 +455,8 @@ - check_type(*op1, t_dictionary); - check_dict_write(*op1); - check_type(*op, t_integer); --#if arch_sizeof_int < arch_sizeof_long -- check_int_leu(*op, max_uint); --#else - if (op->value.intval < 0) - return_error(e_rangecheck); --#endif - new_size = (uint) op->value.intval; - if (dict_length(op - 1) > new_size) - return_error(e_dictfull); -- cgit v1.2.3