Bugfix update to 2.6.8, security patches has been committed upstream, so use patch -E.
 Comments ? Ok ?
  Cheers
   Giovanni
Index: Makefile
===================================================================
RCS file: /cvs/ports/graphics/gimp/stable/Makefile,v
retrieving revision 1.55
diff -u -p -r1.55 Makefile
--- Makefile    22 Dec 2009 16:06:40 -0000      1.55
+++ Makefile    28 Dec 2009 12:11:04 -0000
@@ -2,17 +2,16 @@
 
 COMMENT=       GNU Image Manipulation Program
 
-DISTNAME=      gimp-2.6.7
-SHARED_LIBS=   gimp-2.0        267.0   \
-               gimpbase-2.0    267.0   \
-               gimpcolor-2.0   267.0   \
-               gimpconfig-2.0  267.0   \
-               gimpmath-2.0    267.0   \
-               gimpmodule-2.0  267.0   \
-               gimpthumb-2.0   267.0   \
-               gimpui-2.0      267.0   \
-               gimpwidgets-2.0 267.0
-PKGNAME=       ${DISTNAME}p3
+DISTNAME=      gimp-2.6.8
+SHARED_LIBS=   gimp-2.0        268.0   \
+               gimpbase-2.0    268.0   \
+               gimpcolor-2.0   268.0   \
+               gimpconfig-2.0  268.0   \
+               gimpmath-2.0    268.0   \
+               gimpmodule-2.0  268.0   \
+               gimpthumb-2.0   268.0   \
+               gimpui-2.0      268.0   \
+               gimpwidgets-2.0 268.0
 
 CATEGORIES=    graphics
 MAINTAINER=    Giovanni Bechis <giova...@openbsd.org>
@@ -64,10 +63,10 @@ MODULES=    devel/gettext \
 USE_X11=       Yes
 USE_GMAKE=     Yes
 USE_LIBTOOL=   Yes
-AUTOCONF_VERSION= 2.61
+AUTOCONF_VERSION= 2.62
 CONFIGURE_STYLE= autoconf
 CONFIGURE_ARGS=        ${CONFIGURE_SHARED}
-CONFIGURE_ARGS+=--without-gtkhtml2 --without-gvfs \
+CONFIGURE_ARGS+=--without-gvfs \
                --without-gnomevfs --with-libcurl \
                --without-webkit --enable-gimp-remote
 CONFIGURE_ENV= CPPFLAGS="-I${LOCALBASE}/include/libpng -I${LOCALBASE}/include 
-I${X11BASE}/include" \
Index: distinfo
===================================================================
RCS file: /cvs/ports/graphics/gimp/stable/distinfo,v
retrieving revision 1.24
diff -u -p -r1.24 distinfo
--- distinfo    25 Sep 2009 12:43:16 -0000      1.24
+++ distinfo    28 Dec 2009 12:11:04 -0000
@@ -1,5 +1,5 @@
-MD5 (gimp-2.6.7.tar.bz2) = d+2GqN6bSFh++yTysRWtOA==
-RMD160 (gimp-2.6.7.tar.bz2) = xXZnS6ZUfk0xw01ruCxNQWrduvE=
-SHA1 (gimp-2.6.7.tar.bz2) = BmHRYv7P2Qfhg85ChT3VudPLTFE=
-SHA256 (gimp-2.6.7.tar.bz2) = pAHF++WegSQTy00LN2B2gAib8lQFbYtYU6p54Dpv4RU=
-SIZE (gimp-2.6.7.tar.bz2) = 16341756
+MD5 (gimp-2.6.8.tar.bz2) = pNlGLJQglUgkqAybGWP52Q==
+RMD160 (gimp-2.6.8.tar.bz2) = 2gL+3MAOuqwEv9IcFTpxMNP/Xgg=
+SHA1 (gimp-2.6.8.tar.bz2) = pVCUPwhqvJv2uW1XZ0Eze3GGpPQ=
+SHA256 (gimp-2.6.8.tar.bz2) = 1dQhi3QjkBV/yiOp0szkNpBFRqLqQZ/+tEpfQ8maMzI=
+SIZE (gimp-2.6.8.tar.bz2) = 16342377
Index: patches/patch-plug-ins_file-bmp_bmp-read_c
===================================================================
RCS file: patches/patch-plug-ins_file-bmp_bmp-read_c
diff -N patches/patch-plug-ins_file-bmp_bmp-read_c
--- patches/patch-plug-ins_file-bmp_bmp-read_c  12 Nov 2009 16:35:56 -0000      
1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,36 +0,0 @@
-$OpenBSD: patch-plug-ins_file-bmp_bmp-read_c,v 1.1 2009/11/12 16:35:56 jasper 
Exp $
-
-Security fix to prevent integer overflows.
-Secunia Research, advisory SA37232 and CVE CVE-2009-1570.
-
---- plug-ins/file-bmp/bmp-read.c.orig  Thu Nov 12 16:19:13 2009
-+++ plug-ins/file-bmp/bmp-read.c       Thu Nov 12 16:20:37 2009
-@@ -424,7 +424,8 @@ ReadBMP (const gchar  *name,
-       return -1;
-     }
- 
--  if (Bitmap_Head.biWidth < 0)
-+ if (Bitmap_Head.biWidth < 0 ||
-+   ABS (Bitmap_Head.biHeight) < 0)
-     {
-       g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-                    _("'%s' is not a valid BMP file"),
-@@ -447,6 +448,18 @@ ReadBMP (const gchar  *name,
-                    gimp_filename_to_utf8 (filename));
-       return -1;
-     }
-+
-+ /* protect against integer overflows caused by malicious BMPs */
-+
-+ if (((guint64) Bitmap_Head.biWidth) * Bitmap_Head.biBitCnt > G_MAXINT32 ||
-+     ((guint64) Bitmap_Head.biWidth) * ABS (Bitmap_Head.biHeight) > 
G_MAXINT32 ||
-+      ((guint64) Bitmap_Head.biWidth) * ABS (Bitmap_Head.biHeight) * 4 > 
G_MAXINT32)
-+   {
-+      g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+               _("'%s' is not a valid BMP file"),
-+               gimp_filename_to_utf8 (filename));
-+     return -1;
-+   }
- 
-   /* Windows and OS/2 declare filler so that rows are a multiple of
-    * word length (32 bits == 4 bytes)
Index: patches/patch-plug-ins_file-psd_psd-load_c
===================================================================
RCS file: patches/patch-plug-ins_file-psd_psd-load_c
diff -N patches/patch-plug-ins_file-psd_psd-load_c
--- patches/patch-plug-ins_file-psd_psd-load_c  17 Nov 2009 19:15:05 -0000      
1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,74 +0,0 @@
-$OpenBSD: patch-plug-ins_file-psd_psd-load_c,v 1.1 2009/11/17 19:15:05 jasper 
Exp $
-
-Security fix for CVE-2009-3909
-Gimp PSD Image Parsing Integer Overflow Vulnerability
-
-From upstream git:
-- 9cc8d78ff33b7a36852b74e64b427489cad44d0e
-- 0e440cb6d4d6ee029667363d244aff61b154c33c
-
---- plug-ins/file-psd/psd-load.c.orig  Tue Nov 17 19:15:20 2009
-+++ plug-ins/file-psd/psd-load.c       Tue Nov 17 19:15:48 2009
-@@ -542,10 +542,10 @@ read_layer_block (PSDimage  *img_a,
-                   psd_set_error (feof (f), errno, error);
-                   return NULL;
-                 }
--              lyr_a[lidx]->top = GUINT32_FROM_BE (lyr_a[lidx]->top);
--              lyr_a[lidx]->left = GUINT32_FROM_BE (lyr_a[lidx]->left);
--              lyr_a[lidx]->bottom = GUINT32_FROM_BE (lyr_a[lidx]->bottom);
--              lyr_a[lidx]->right = GUINT32_FROM_BE (lyr_a[lidx]->right);
-+              lyr_a[lidx]->top = GINT32_FROM_BE (lyr_a[lidx]->top);
-+              lyr_a[lidx]->left = GINT32_FROM_BE (lyr_a[lidx]->left);
-+              lyr_a[lidx]->bottom = GINT32_FROM_BE (lyr_a[lidx]->bottom);
-+              lyr_a[lidx]->right = GINT32_FROM_BE (lyr_a[lidx]->right);
-               lyr_a[lidx]->num_channels = GUINT16_FROM_BE 
(lyr_a[lidx]->num_channels);
- 
-               if (lyr_a[lidx]->num_channels > MAX_CHANNELS)
-@@ -691,13 +691,13 @@ read_layer_block (PSDimage  *img_a,
-                         return NULL;
-                       }
-                     lyr_a[lidx]->layer_mask.top =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask.top);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask.top);
-                     lyr_a[lidx]->layer_mask.left =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask.left);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask.left);
-                     lyr_a[lidx]->layer_mask.bottom =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask.bottom);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask.bottom);
-                     lyr_a[lidx]->layer_mask.right =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask.right);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask.right);
-                     lyr_a[lidx]->layer_mask.mask_flags.relative_pos =
-                       lyr_a[lidx]->layer_mask.flags & 1 ? TRUE : FALSE;
-                     lyr_a[lidx]->layer_mask.mask_flags.disabled =
-@@ -723,21 +723,21 @@ read_layer_block (PSDimage  *img_a,
-                         return NULL;
-                       }
-                     lyr_a[lidx]->layer_mask_extra.top =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask_extra.top);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask_extra.top);
-                     lyr_a[lidx]->layer_mask_extra.left =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask_extra.left);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask_extra.left);
-                     lyr_a[lidx]->layer_mask_extra.bottom =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask_extra.bottom);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask_extra.bottom);
-                     lyr_a[lidx]->layer_mask_extra.right =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask_extra.right);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask_extra.right);
-                     lyr_a[lidx]->layer_mask.top =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask.top);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask.top);
-                     lyr_a[lidx]->layer_mask.left =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask.left);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask.left);
-                     lyr_a[lidx]->layer_mask.bottom =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask.bottom);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask.bottom);
-                     lyr_a[lidx]->layer_mask.right =
--                      GUINT32_FROM_BE (lyr_a[lidx]->layer_mask.right);
-+                      GINT32_FROM_BE (lyr_a[lidx]->layer_mask.right);
-                     lyr_a[lidx]->layer_mask.mask_flags.relative_pos =
-                       lyr_a[lidx]->layer_mask.flags & 1 ? TRUE : FALSE;
-                     lyr_a[lidx]->layer_mask.mask_flags.disabled =
Index: patches/patch-plug-ins_file-psd_psd_h
===================================================================
RCS file: patches/patch-plug-ins_file-psd_psd_h
diff -N patches/patch-plug-ins_file-psd_psd_h
--- patches/patch-plug-ins_file-psd_psd_h       17 Nov 2009 19:15:05 -0000      
1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,55 +0,0 @@
-$OpenBSD: patch-plug-ins_file-psd_psd_h,v 1.1 2009/11/17 19:15:05 jasper Exp $
-
-Security fix for CVE-2009-3909
-Gimp PSD Image Parsing Integer Overflow Vulnerability
-
-From upstream git:
-- 9cc8d78ff33b7a36852b74e64b427489cad44d0e
-- 0e440cb6d4d6ee029667363d244aff61b154c33c
-
---- plug-ins/file-psd/psd.h.orig       Mon Jul 20 22:20:51 2009
-+++ plug-ins/file-psd/psd.h    Tue Nov 17 19:15:48 2009
-@@ -447,10 +447,10 @@ typedef struct
- /* PSD Layer mask data (length 20) */
- typedef struct
- {
--  guint32               top;                    /* Layer top */
--  guint32               left;                   /* Layer left */
--  guint32               bottom;                 /* Layer bottom */
--  guint32               right;                  /* Layer right */
-+  gint32                top;                    /* Layer top */
-+  gint32                left;                   /* Layer left */
-+  gint32                bottom;                 /* Layer bottom */
-+  gint32                right;                  /* Layer right */
-   guchar                def_color;              /* Default background colour 
*/
-   guchar                flags;                  /* Layer flags */
-   guchar                extra_def_color;        /* Real default background 
colour */
-@@ -461,20 +461,20 @@ typedef struct
- /* PSD Layer mask data (length 36) */
- typedef struct
- {
--  guint32               top;                    /* Layer top */
--  guint32               left;                   /* Layer left */
--  guint32               bottom;                 /* Layer bottom */
--  guint32               right;                  /* Layer right */
-+  gint32                top;                    /* Layer top */
-+  gint32                left;                   /* Layer left */
-+  gint32                bottom;                 /* Layer bottom */
-+  gint32                right;                  /* Layer right */
- } LayerMaskExtra;
- 
- /* PSD Layer data structure */
- typedef struct
- {
-   gboolean              drop;                   /* Do not add layer to GIMP 
image */
--  guint32               top;                    /* Layer top */
--  guint32               left;                   /* Layer left */
--  guint32               bottom;                 /* Layer bottom */
--  guint32               right;                  /* Layer right */
-+  gint32                top;                    /* Layer top */
-+  gint32                left;                   /* Layer left */
-+  gint32                bottom;                 /* Layer bottom */
-+  gint32                right;                  /* Layer right */
-   guint16               num_channels;           /* Number of channels */
-   ChannelLengthInfo    *chn_info;               /* Channel length info */
-   gchar                 mode_key[4];            /* Blend mode key */

Reply via email to