On 24 October 2014 13:08, Jason Tubnor <ja...@tubnor.net> wrote: > > > Thoughts / OK / Commit ? > > ---------------------- > > -DISTNAME= gif2png-2.5.2 > +DISTNAME= gif2png-2.5.9 > REVISION= 1
As suggested to me, REVISION needed to be removed. Below is the new diff with this removed: ----------------------- Index: Makefile =================================================================== RCS file: /cvs/ports/graphics/gif2png/Makefile,v retrieving revision 1.42 diff -u -p -u -p -r1.42 Makefile --- Makefile 3 Jun 2013 02:46:57 -0000 1.42 +++ Makefile 25 Oct 2014 06:42:23 -0000 @@ -1,9 +1,8 @@ -# $OpenBSD: Makefile,v 1.42 2013/06/03 02:46:57 naddy Exp $ +# $OpenBSD: Makefile,v 1.43 2014/10/24 10:26:56 naddy Exp $ COMMENT= converts GIF images to the PNG format -DISTNAME= gif2png-2.5.2 -REVISION= 1 +DISTNAME= gif2png-2.5.9 CATEGORIES= graphics HOMEPAGE= http://www.catb.org/~esr/gif2png/ Index: distinfo =================================================================== RCS file: /cvs/ports/graphics/gif2png/distinfo,v retrieving revision 1.7 diff -u -p -u -p -r1.7 distinfo --- distinfo 17 Oct 2010 06:51:48 -0000 1.7 +++ distinfo 25 Oct 2014 06:42:23 -0000 @@ -1,5 +1,2 @@ -MD5 (gif2png-2.5.2.tar.gz) = IgCEHwJ8hIHEuFGdq/dFsA== -RMD160 (gif2png-2.5.2.tar.gz) = o2GxivI+WbcxIa4loVW1T7YusUo= -SHA1 (gif2png-2.5.2.tar.gz) = Dp5m1nKP5+Lc3mGtDjmKYIlJRrM= -SHA256 (gif2png-2.5.2.tar.gz) = wbQGatN83LhoHOzt1j2u2MtcgnNE2kZScPMkvBL/Ptc= -SIZE (gif2png-2.5.2.tar.gz) = 171740 +SHA256 (gif2png-2.5.9.tar.gz) = yEBrfAwI9QSVKhcZ4E8jZu5EyIjA7frDpj/qKrBbZMc= +SIZE (gif2png-2.5.9.tar.gz) = 137750 cvs server: Diffing files cvs server: Diffing patches Index: patches/patch-gif2png_c =================================================================== RCS file: /cvs/ports/graphics/gif2png/patches/patch-gif2png_c,v retrieving revision 1.2 diff -u -p -u -p -r1.2 patch-gif2png_c --- patches/patch-gif2png_c 8 Jul 2011 20:36:09 -0000 1.2 +++ patches/patch-gif2png_c 25 Oct 2014 06:42:23 -0000 @@ -1,36 +1,6 @@ -$OpenBSD: patch-gif2png_c,v 1.2 2011/07/08 20:36:09 naddy Exp $ - -Fixes cmdline buffer overflow described in - -http://lists.grok.org.uk/pipermail/full-disclosure/2009-December/072002.html -http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550978 - -From: http://cvs.fedoraproject.org/viewvc/rpms/gif2png/devel/gif2png-overflow.patch?revision=HEAD&root=extras&view=markup - -Fix build with png-1.5. - ---- gif2png.c.orig Wed Nov 11 13:28:02 2009 -+++ gif2png.c Wed Jul 6 17:39:37 2011 -@@ -10,6 +10,7 @@ - #include <string.h> - #include <stdlib.h> - #include <unistd.h> /* for isatty() */ -+#include <zlib.h> - - #if !defined(TRUE) - #define FALSE 0 -@@ -120,8 +121,8 @@ int writefile(struct GIFelement *s,struct GIFelement * - int colors_used = 0; - byte remap[MAXCMSIZE]; - int low_prec; -- png_struct *png_ptr = xalloc(sizeof (png_struct)); -- png_info *info_ptr = xalloc(sizeof (png_info)); -+ png_struct *png_ptr; -+ png_info *info_ptr; - int p; - int gray_bitdepth; - png_color pal_rgb[MAXCMSIZE], *pltep; -@@ -136,6 +137,19 @@ int writefile(struct GIFelement *s,struct GIFelement * +--- gif2png.c.orig Fri Mar 9 16:08:27 2012 ++++ gif2png.c Fri Oct 24 11:58:55 2014 +@@ -140,6 +140,19 @@ static int writefile(struct GIFelement *s, struct GIFe png_text software; png_text comment; @@ -49,30 +19,44 @@ Fix build with png-1.5. + /* these volatile declarations prevent gcc warnings ("variable might be * clobbered by `longjmp' or `vfork'") */ - volatile int gray = TRUE; -@@ -682,7 +696,10 @@ int processfile(char *fname, FILE *fp) + volatile bool gray = true; +@@ -751,7 +764,7 @@ static int processfile(char *fname, FILE *fp) - strcpy(outname, fname); + /* create output filename */ -- file_ext = outname+strlen(outname)-4; -+ file_ext = outname+strlen(outname); -+ if (file_ext >= outname + 4) -+ file_ext -= 4; -+ - if (strcmp(file_ext, ".gif") != 0 && strcmp(file_ext, ".GIF") != 0 && - strcmp(file_ext, "_gif") != 0 && strcmp(file_ext, "_GIF") != 0) { - /* try to derive basename */ -@@ -874,6 +891,13 @@ int main(int argc, char *argv[]) +- (void)strcpy(outname, fname); ++ (void)strlcpy(outname, fname, strlen(fname)+1); + + file_ext = outname+strlen(outname); + if (file_ext >= outname + 4) +@@ -771,7 +784,7 @@ static int processfile(char *fname, FILE *fp) } - } else { - for (i = ac;i<argc; i++) { -+ /* make sure that there is enough space for a '.p<NUM>' suffix; -+ this check catches also the '.gif' case below. */ -+ if (strlen(argv[i]) >= sizeof name - sizeof ".p" - 3 * sizeof(int)) { -+ fprintf(stderr, "%s: name too long\n", argv[i]); -+ errors = 1; -+ continue; -+ } - strcpy(name, argv[i]); + } + +- (void)strcpy(file_ext, ".png"); /* images are named .png, .p01, .p02, ... */ ++ (void)strlcpy(file_ext, ".png", 5); /* images are named .png, .p01, .p02, ... */ + + start = NULL; + +@@ -802,7 +815,7 @@ static int processfile(char *fname, FILE *fp) + ++numpngs; + start = NULL; + /*@-bufferoverflowhigh*/ +- (void)sprintf(file_ext, ".p%02d", i); ++ (void)snprintf(file_ext, 5, ".p%02d", i); + /*@=bufferoverflowhigh*/ + } + } +@@ -972,10 +985,10 @@ int main(int argc, char *argv[]) + continue; + } + +- (void)strcpy(name, argv[i]); ++ (void)strlcpy(name, argv[i], strlen(argv[i])+1); if ((fp = fopen(name, "rb")) == NULL) { /* retry with .gif appended */ +- (void)strcat(name, ".gif"); ++ (void)strlcat(name, ".gif", 5); + fp = fopen(name,"rb"); + } + if (fp == NULL) {