221 Commits

Author SHA1 Message Date
ajacoutot
b676f0b97b configure --without-zstd otherwise it gets picked up if present and
junked by dpb(1) during bulks.
2018-12-19 13:34:14 +00:00
sthen
f58de507e3 update to ImageMagick 6.9.10-14 2018-11-06 22:27:13 +00:00
sthen
d38c34111a remove junk target; noop 2018-11-05 17:23:12 +00:00
sthen
25f0e460f2 Add COMPILER lines to c++ ports which currently use the default. Adjust
some existing COMPILER lines with arch restrictions etc. In the usual
case this is now using "COMPILER = base-clang ports-gcc base-gcc" on
ports with c++ libraries in WANTLIB.

This is basically intended to be a noop on architectures using clang
as the system compiler, but help with other architectures where we
currently have many ports knocked out due to building with an unsuitable
compiler -

- some ports require c++11/newer so the GCC version in base that is used
on these archirtectures is too old.

- some ports have conflicts where an executable is built with one compiler
(e.g. gcc from base) but a library dependency is built with a different
one (e.g. gcc from ports), resulted in mixing incompatible libraries in the
same address space.

devel/gmp is intentionally skipped as it's on the path to building gcc -
the c++ library there is unused in ports (and not built by default upstream)
so intending to disable building gmpcxx in a future commit.
2018-10-24 14:27:57 +00:00
sthen
4501da91dd disable the gs delegate altogether in default policy.xml, rather than
the various coders which use it
2018-08-23 12:48:06 +00:00
sthen
7789f5ac37 also disable PS2/PS3 by default, pointed out by Bob Friesenhahn on oss-sec 2018-08-22 22:53:47 +00:00
sthen
054f22e19b Update to ImageMagick 6.9.10-10 including various fixes for bugs found by
OSS Fuzz.

Disable ghostscript-based coders in the default config file (policy.xml)
following suggestion in http://www.openwall.com/lists/oss-security/2018/08/21/2
If you're using an edited config file or using ImageMagick in chroot, you may
want to consider following suit.
2018-08-22 18:36:00 +00:00
sthen
c84d10b6b1 update to ImageMagick-6.9.9-47, seems to fix crashes seen in geo/postgis
build and probably others.

noting here just for the sake of it, my test case reduced to:
convert -size 200x200 xc:none -draw "path 'M 110,190 M 70,40'" tmp0.png
2018-05-24 09:33:42 +00:00
sthen
7be17df0af update to ImageMagick-6.9.9-46 2018-05-21 21:12:48 +00:00
sthen
4a560155e2 update to ImageMagick-6.9.9-38, fixing memory leaks and numerous use of
uninitialized values, integer overflow, memory exceeded, and timeouts
(mostly from OSS Fuzz).
2018-03-17 16:02:30 +00:00
sthen
2d0b8c390c update to ImageMagick-6.9.9-30 2017-12-28 21:56:32 +00:00
sthen
c0e48c4722 add hidden dep on libraw (raw_r), and explicitly disable flif/raqm 2017-11-07 14:20:06 +00:00
sthen
64e165fd7c re-regen WANTLIB to unbreak 2017-11-04 00:00:48 +00:00
sthen
04fc475458 regen WANTLIB 2017-11-03 10:53:39 +00:00
sthen
8d2c594374 update to ImageMagick-6.9.9-21 2017-11-03 10:35:49 +00:00
sthen
b9064dc0ff Handle pthread-stubs removal. 2017-10-23 17:10:49 +00:00
sthen
2c6dc69406 update to ImageMagick 6.9.9-11 2017-09-06 14:18:08 +00:00
sthen
5e964ab0df bump LIBCXX/LIBECXX/COMPILER_LIBCXX ports. 2017-07-26 22:45:14 +00:00
sthen
ee4cbd9413 security update to ImageMagick-6.9.9-0 (crafted RLE image can trigger a crash
because of incorrect EOF handling in coders/rle.c)
2017-07-18 16:05:12 +00:00
espie
8ac47fd9c6 use COMPILER_LIBCXX where applicable 2017-07-16 19:18:47 +00:00
sthen
3730eb4a73 update to ImageMagick-6.9.8-6 2017-05-21 15:02:41 +00:00
sthen
bcbf44ab87 use LIBCXX 2017-04-10 11:46:18 +00:00
sthen
1ea96f813c update to ImageMagick 6.9.8-3 2017-03-28 10:51:37 +00:00
sthen
21c7167c9d update to ImageMagick-6.9.7-0 2016-12-22 21:26:20 +00:00
sthen
ad40923974 update to ImageMagick-6.9.6-7 2016-12-06 14:44:23 +00:00
sthen
7be3acb72e update to ImageMagick 6.9.6-4 2016-11-13 20:54:46 +00:00
naddy
6ba202c932 replace libiconv module 2016-09-13 15:29:01 +00:00
sthen
098f467560 update to ImageMagick-6.9.5-5; buffer overflow, use-after-free 2016-08-12 13:38:49 +00:00
sthen
6d0f5ed0f6 update to ImageMagick-6.9.5-4, with (amongst others) some buffer overflow fixes 2016-08-02 22:52:55 +00:00
sthen
4cf3c30061 update to ImageMagick-6.9.4.10 2016-06-27 23:10:47 +00:00
sthen
ee2f231f8a bugfix update to ImageMagick-6.9.4-9 2016-06-13 13:17:57 +00:00
sthen
5c64d9cf5f update to ImageMagick 6.9.4-8, from Brad (fixes include a heap overflow) 2016-06-11 11:58:00 +00:00
sthen
2f532da190 your regular scheduled ImageMagick update to disable stupid stuff,
this time indirect reads by using @ in the filename. also, upstream
disabled popen by default, so no need for the autoconf trick.
2016-06-02 14:51:41 +00:00
sthen
45878d9507 Update to ImageMagick-6.9.4-5. Similar diff (but without the bump) from
Rafael Sadowski.
2016-05-31 09:00:40 +00:00
sthen
384503724e Update to ImageMagick-6.9.4-4.
While there, neuter popen support ("convert '|echo Hello > hello.txt;' null:")
http://openwall.com/lists/oss-security/2016/05/29/7
2016-05-30 12:02:53 +00:00
sthen
41349f5b45 update to ImageMagick 6.9.4-3
* Fix pixel cache on disk regression
* Quote passwords when passed to a delegate program
* Can read geo-related EXIF metdata once-again
* Sanitize all delegate emedded formatting characters
* Don't sync pixel cache in AcquireAuthenticCacheView()
2016-05-19 19:49:14 +00:00
sthen
c7b2640077 update to ImageMagick 6.9.4-1
- Remove https delegate.
- Check for buffer overflow in magick/draw.c/DrawStrokePolygon().
- Replace show delegate title with image filename rather than label.
- Fix GetNextToken() off by one error.
- Remove support for internal ephemeral coder.
2016-05-12 21:49:15 +00:00
sthen
17f1528ad7 update to ImageMagick 6.9.3-10, additional sanitisation of input filenames for
http/https delegates above what was already done in 6.9.3-9. (security)
https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
2016-05-06 20:16:35 +00:00
sthen
80e6b25d28 update to ImageMagick 6.9.3-9 2016-05-01 13:45:00 +00:00
sthen
5268b7956f Update to ImageMagick 6.9.3-8. While there, set PORTROACH marker to try
and do something slightly more useful (the naming scheme doesn't work
very well with portroach, but hopefully pointing at /download/ rather
than letting it use /download/releases/ will mean it only picks up
changes to the minor release of the current version).
2016-04-18 10:03:51 +00:00
naddy
2c4204cf62 remove SHARED_ONLY from simple ports that use the gettext or libiconv module 2016-03-18 21:38:22 +00:00
naddy
ce859edcb4 garbage collect CONFIGURE_SHARED 2016-03-11 20:28:21 +00:00
sthen
c2d741bb07 update to ImageMagick-6.9.3-7 2016-03-08 00:27:03 +00:00
sthen
ce29b5137e update to ImageMagick-6.9.3 and take maintainer 2016-01-07 23:44:09 +00:00
sthen
7b45250609 update to ImageMagick-6.9.2-7, drop wmf delegate, move back to non-modular
build.

Since 6.9.0 the wmf delegate depends on MagickWand; with a non-modular
build the delegate is in MagickCore, meaning that if enabled, programs
can no longer link against just Core. In the last version of this port we
changed to the modular build to avoid the wmf issue, however as discovered
by Manolis Tzanidakis the modular build doesn't play nicely with programs
trying to use this from chroot e.g. common uses of pecl-imagick.

http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=28634

At least some wmf functionality still seems to work even without the
delegate, but if you need this and run into problems, you could try
GraphicsMagick instead (prefix tools with 'gm' e.g. 'gm convert' instead
of just 'convert').
2015-11-29 10:44:58 +00:00
sthen
fb459cf019 update to ImageMagick 6.9.2-5
- dependent ports will be fixed in the following commit
2015-11-06 20:37:21 +00:00
ajacoutot
549dece69f Do not pick up openmp.
from brad
2015-06-08 06:55:00 +00:00
ajacoutot
0dfcfe23f8 Fix ghostscript font directory.
reported by deraadt@
2015-06-01 06:54:02 +00:00
ajacoutot
c749e4101d No need to pass PTHREAD_CFLAGS nor PTHREAD_LIBS anymore.
from brad

Tested in a bulk
2015-05-14 06:39:13 +00:00
naddy
570aa62a9c Drop remaining MD5/RMD160/SHA1 checksums. 2015-01-18 03:12:39 +00:00