mirror of
https://git.FreeBSD.org/ports.git
synced 2024-10-18 19:49:40 +00:00
graphics/optipng: Update to 0.7.8
- CVE fix is now upstreamed - Remove old compile fix related patches - Remove gmake dependency Changelog: https://optipng.sourceforge.net/history.txt
This commit is contained in:
parent
5dd1286fb9
commit
76614e4b55
@ -1,8 +1,7 @@
|
||||
PORTNAME= optipng
|
||||
DISTVERSION= 0.7.7
|
||||
PORTREVISION= 1
|
||||
DISTVERSION= 0.7.8
|
||||
CATEGORIES= graphics
|
||||
MASTER_SITES= SF/${PORTNAME}/OptiPNG/${PORTNAME}-${PORTVERSION}
|
||||
MASTER_SITES= SF/${PORTNAME}/OptiPNG/${PORTNAME}-${DISTVERSION}
|
||||
|
||||
MAINTAINER= tom@hur.st
|
||||
COMMENT= Optimizer for PNG files
|
||||
@ -13,7 +12,7 @@ LICENSE_FILE= ${WRKSRC}/LICENSE.txt
|
||||
|
||||
LIB_DEPENDS= libpng.so:graphics/png
|
||||
|
||||
USES= cpe gmake localbase:ldflags
|
||||
USES= cpe localbase:ldflags
|
||||
CPE_VENDOR= optipng_project
|
||||
|
||||
HAS_CONFIGURE= yes
|
||||
@ -30,7 +29,6 @@ OPTIONS_DEFINE= DOCS
|
||||
do-install:
|
||||
${INSTALL_PROGRAM} ${WRKSRC}/src/optipng/optipng ${STAGEDIR}${PREFIX}/bin/
|
||||
${INSTALL_MAN} ${WRKSRC}/src/optipng/man/optipng.1 ${STAGEDIR}${MAN1PREFIX}/man/man1/
|
||||
|
||||
${INSTALL} -d ${STAGEDIR}${DOCSDIR}
|
||||
${INSTALL_DATA} ${PORTDOCS:S,^,${WRKSRC}/doc/,} ${STAGEDIR}${DOCSDIR}/
|
||||
|
||||
|
@ -1,3 +1,3 @@
|
||||
TIMESTAMP = 1515280833
|
||||
SHA256 (optipng-0.7.7.tar.gz) = 4f32f233cef870b3f95d3ad6428bfe4224ef34908f1b42b0badf858216654452
|
||||
SIZE (optipng-0.7.7.tar.gz) = 2329555
|
||||
TIMESTAMP = 1699204767
|
||||
SHA256 (optipng-0.7.8.tar.gz) = 25a3bd68481f21502ccaa0f4c13f84dcf6b20338e4c4e8c51f2cefbd8513398c
|
||||
SIZE (optipng-0.7.8.tar.gz) = 3294014
|
||||
|
@ -1,14 +0,0 @@
|
||||
--- src/gifread/gifread.c.orig 2017-12-10 23:49:00 UTC
|
||||
+++ src/gifread/gifread.c
|
||||
@@ -363,6 +363,11 @@ static int LZWGetCode(int code_size, int init_flag, FI
|
||||
lastbit = (2 + count) * 8;
|
||||
}
|
||||
|
||||
+ if (code_size && (size_t)(curbit + code_size - 1) / 8 >= sizeof(buffer)) {
|
||||
+ GIFError("Malformed GIF (CVE-2023-43907)");
|
||||
+ return -1;
|
||||
+ }
|
||||
+
|
||||
ret = 0;
|
||||
for (i = curbit, j = 0; j < code_size; ++i, ++j)
|
||||
ret |= ((buffer[i / 8] & (1 << (i % 8))) != 0) << j;
|
@ -1,11 +0,0 @@
|
||||
--- src/pngxtern/pngxmem.c.orig 2018-01-06 23:22:33 UTC
|
||||
+++ src/pngxtern/pngxmem.c
|
||||
@@ -35,7 +35,7 @@ pngx_malloc_rows_extended(png_structp pn
|
||||
row_size = png_get_rowbytes(png_ptr, info_ptr);
|
||||
/* libpng sets row_size to 0 when the width is too large to process. */
|
||||
if (row_size == 0 ||
|
||||
- (pngx_alloc_size_t)height > (pngx_alloc_size_t)(-1) / sizeof(png_bytep))
|
||||
+ (pngx_alloc_size_t)height > (pngx_alloc_size_t)(-1U) / sizeof(png_bytep))
|
||||
png_error(png_ptr, "Can't handle exceedingly large image dimensions");
|
||||
if (row_size < min_row_size)
|
||||
row_size = min_row_size;
|
Loading…
Reference in New Issue
Block a user