- update lcms to 1.18

* includes security fixes for CVE-2009-0581, CVE-2009-0723 and CVE-2009-0733.
(which could cause a memory leak, buffer overflows and code execution)

ok ajacoutot@
This commit is contained in:
jasper 2009-04-09 13:10:49 +00:00
parent 6ea22ca3a3
commit 1601d3234d
3 changed files with 12 additions and 13 deletions

View File

@ -1,10 +1,9 @@
# $OpenBSD: Makefile,v 1.17 2008/07/19 11:18:23 espie Exp $
# $OpenBSD: Makefile,v 1.18 2009/04/09 13:10:49 jasper Exp $
COMMENT = color management library
DISTNAME = lcms-1.17
DISTNAME = lcms-1.18
SHARED_LIBS = lcms 2.0
PKGNAME = ${DISTNAME}p0
CATEGORIES = graphics
MASTER_SITES = ${MASTER_SITE_SOURCEFORGE:=lcms/}

View File

@ -1,5 +1,5 @@
MD5 (lcms-1.17.tar.gz) = B727TPsF0hyqWP49HITdwQ==
RMD160 (lcms-1.17.tar.gz) = GtZylbU6guSBMpTLzfzPilvbG70=
SHA1 (lcms-1.17.tar.gz) = CD6wKJAEj4Q4A6WXSRTlS14DRJM=
SHA256 (lcms-1.17.tar.gz) = XvO02rMJVncgCeKdujP+ElbPnaFhEGoecLCWbJbRRYM=
SIZE (lcms-1.17.tar.gz) = 898816
MD5 (lcms-1.18.tar.gz) = n5COLcSPdtt3rDWjguOUxw==
RMD160 (lcms-1.18.tar.gz) = dsN6wCn3M7u5qFAjTmK/0qSgS/Q=
SHA1 (lcms-1.18.tar.gz) = cAG62xSy6cuJ4mN73FbyPr/y1A4=
SHA256 (lcms-1.18.tar.gz) = VY+Olsi0Ok5oIpVimthPFURUtsZEfYdIQB97zXLA63E=
SIZE (lcms-1.18.tar.gz) = 915536

View File

@ -1,6 +1,6 @@
$OpenBSD: patch-include_lcms_h,v 1.7 2008/07/19 11:18:23 espie Exp $
--- include/lcms.h.orig Sat Jul 19 12:52:40 2008
+++ include/lcms.h Sat Jul 19 12:55:23 2008
$OpenBSD: patch-include_lcms_h,v 1.8 2009/04/09 13:10:49 jasper Exp $
--- include/lcms.h.orig Thu Apr 9 13:56:40 2009
+++ include/lcms.h Thu Apr 9 13:59:19 2009
@@ -143,17 +143,17 @@ typedef pthread_rwlock_t LCMS_RWLOCK_T;
# define USE_BIG_ENDIAN 1
#endif
@ -17,12 +17,12 @@ $OpenBSD: patch-include_lcms_h,v 1.7 2008/07/19 11:18:23 espie Exp $
# endif
#endif
-#if __BIG_ENDIAN__
-#ifdef __BIG_ENDIAN__
+#if defined(__BIG_ENDIAN__) && __BIG_ENDIAN__
# define USE_BIG_ENDIAN 1
#endif
@@ -1407,7 +1407,6 @@ LCMS_INLINE WORD _cmsClampWord(int in)
@@ -1415,7 +1415,6 @@ LCMS_INLINE WORD _cmsClampWord(int in)
LCMS_INLINE void* _cmsMalloc(size_t size)
{
if (size > ((size_t) 1024*1024*500)) return NULL; // Never allow over 500Mb