Update optipng to 0.7.7.

As discussed with him, remove Kyle Isom from MAINTAINER (ENOTIME) and
take maintainership.

OK rsadowski@
This commit is contained in:
fcambus 2018-01-09 10:42:52 +00:00
parent 25141c2f25
commit 41d895abc3
4 changed files with 5 additions and 40 deletions

View File

@ -1,13 +1,12 @@
# $OpenBSD: Makefile,v 1.4 2017/12/12 15:51:44 fcambus Exp $
# $OpenBSD: Makefile,v 1.5 2018/01/09 10:42:52 fcambus Exp $
COMMENT = lossless PNG optimizer
DISTNAME = optipng-0.7.6
REVISION = 0
DISTNAME = optipng-0.7.7
CATEGORIES = graphics
HOMEPAGE = http://optipng.sourceforge.net/
MAINTAINER = Kyle Isom <kyle@tyrfingr.is>
MAINTAINER = Frederic Cambus <fcambus@openbsd.org>
# zlib
PERMIT_PACKAGE_CDROM = Yes

View File

@ -1,2 +1,2 @@
SHA256 (optipng-0.7.6.tar.gz) = SHBjH8vTglYF8AoWi43r9E6hzajvmKc+VBHu6XGZvoA=
SIZE (optipng-0.7.6.tar.gz) = 2202237
SHA256 (optipng-0.7.7.tar.gz) = TzLyM874cLP5XTrWQov+QiTvNJCPG0Kwut+FghZlRFI=
SIZE (optipng-0.7.7.tar.gz) = 2329555

View File

@ -1,17 +0,0 @@
$OpenBSD: patch-src_gifread_gifread_c,v 1.1 2017/12/12 15:51:44 fcambus Exp $
Fix for CVE-2017-16938 (Global buffer overflow)
https://sourceforge.net/p/optipng/bugs/69/
Index: src/gifread/gifread.c
--- src/gifread/gifread.c.orig
+++ src/gifread/gifread.c
@@ -499,6 +499,8 @@ static int LZWReadByte(int init_flag, int input_code_s
*sp++ = table[1][code];
if (code == table[0][code])
GIFError("GIF/LZW error: circular table entry");
+ if ((size_t)(sp - stack) >= sizeof(stack) / sizeof(stack[0]))
+ GIFError("GIF/LZW error: circular table");
code = table[0][code];
}

View File

@ -1,17 +0,0 @@
$OpenBSD: patch-src_minitiff_tiffread_c,v 1.1 2017/12/12 15:51:44 fcambus Exp $
Fix for CVE-2017-1000229 (Integer overflow)
https://sourceforge.net/p/optipng/bugs/65/
Index: src/minitiff/tiffread.c
--- src/minitiff/tiffread.c.orig
+++ src/minitiff/tiffread.c
@@ -350,6 +350,8 @@ minitiff_read_info(struct minitiff_info *tiff_ptr, FIL
count = tiff_ptr->strip_offsets_count;
if (count == 0 || count > tiff_ptr->height)
goto err_invalid;
+ if (count > (size_t)-1 / sizeof(long))
+ goto err_memory;
tiff_ptr->strip_offsets = (long *)malloc(count * sizeof(long));
if (tiff_ptr->strip_offsets == NULL)
goto err_memory;