1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-10-18 19:49:40 +00:00

graphics/optipng: Update to 0.7.8

- CVE fix is now upstreamed
- Remove old compile fix related patches
- Remove gmake dependency

Changelog: https://optipng.sourceforge.net/history.txt
This commit is contained in:
Thomas Hurst 2023-11-09 21:24:26 +01:00 committed by Daniel Engberg
parent 5dd1286fb9
commit 76614e4b55
4 changed files with 6 additions and 33 deletions

View File

@ -1,8 +1,7 @@
PORTNAME= optipng
DISTVERSION= 0.7.7
PORTREVISION= 1
DISTVERSION= 0.7.8
CATEGORIES= graphics
MASTER_SITES= SF/${PORTNAME}/OptiPNG/${PORTNAME}-${PORTVERSION}
MASTER_SITES= SF/${PORTNAME}/OptiPNG/${PORTNAME}-${DISTVERSION}
MAINTAINER= tom@hur.st
COMMENT= Optimizer for PNG files
@ -13,7 +12,7 @@ LICENSE_FILE= ${WRKSRC}/LICENSE.txt
LIB_DEPENDS= libpng.so:graphics/png
USES= cpe gmake localbase:ldflags
USES= cpe localbase:ldflags
CPE_VENDOR= optipng_project
HAS_CONFIGURE= yes
@ -30,7 +29,6 @@ OPTIONS_DEFINE= DOCS
do-install:
${INSTALL_PROGRAM} ${WRKSRC}/src/optipng/optipng ${STAGEDIR}${PREFIX}/bin/
${INSTALL_MAN} ${WRKSRC}/src/optipng/man/optipng.1 ${STAGEDIR}${MAN1PREFIX}/man/man1/
${INSTALL} -d ${STAGEDIR}${DOCSDIR}
${INSTALL_DATA} ${PORTDOCS:S,^,${WRKSRC}/doc/,} ${STAGEDIR}${DOCSDIR}/

View File

@ -1,3 +1,3 @@
TIMESTAMP = 1515280833
SHA256 (optipng-0.7.7.tar.gz) = 4f32f233cef870b3f95d3ad6428bfe4224ef34908f1b42b0badf858216654452
SIZE (optipng-0.7.7.tar.gz) = 2329555
TIMESTAMP = 1699204767
SHA256 (optipng-0.7.8.tar.gz) = 25a3bd68481f21502ccaa0f4c13f84dcf6b20338e4c4e8c51f2cefbd8513398c
SIZE (optipng-0.7.8.tar.gz) = 3294014

View File

@ -1,14 +0,0 @@
--- src/gifread/gifread.c.orig 2017-12-10 23:49:00 UTC
+++ src/gifread/gifread.c
@@ -363,6 +363,11 @@ static int LZWGetCode(int code_size, int init_flag, FI
lastbit = (2 + count) * 8;
}
+ if (code_size && (size_t)(curbit + code_size - 1) / 8 >= sizeof(buffer)) {
+ GIFError("Malformed GIF (CVE-2023-43907)");
+ return -1;
+ }
+
ret = 0;
for (i = curbit, j = 0; j < code_size; ++i, ++j)
ret |= ((buffer[i / 8] & (1 << (i % 8))) != 0) << j;

View File

@ -1,11 +0,0 @@
--- src/pngxtern/pngxmem.c.orig 2018-01-06 23:22:33 UTC
+++ src/pngxtern/pngxmem.c
@@ -35,7 +35,7 @@ pngx_malloc_rows_extended(png_structp pn
row_size = png_get_rowbytes(png_ptr, info_ptr);
/* libpng sets row_size to 0 when the width is too large to process. */
if (row_size == 0 ||
- (pngx_alloc_size_t)height > (pngx_alloc_size_t)(-1) / sizeof(png_bytep))
+ (pngx_alloc_size_t)height > (pngx_alloc_size_t)(-1U) / sizeof(png_bytep))
png_error(png_ptr, "Can't handle exceedingly large image dimensions");
if (row_size < min_row_size)
row_size = min_row_size;