summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRobert Buchholz <rbu@gentoo.org>2007-09-01 17:16:35 +0000
committerRobert Buchholz <rbu@gentoo.org>2007-09-01 17:16:35 +0000
commitc4d26827e4f45701ab6cc7ef1e9f024907512a26 (patch)
treec1517c0e7ca3970ff360995c0160f6413a84ffc2 /app-text/tetex
parentStable on ppc wrt bug 190572 (diff)
downloadhistorical-c4d26827e4f45701ab6cc7ef1e9f024907512a26.tar.gz
historical-c4d26827e4f45701ab6cc7ef1e9f024907512a26.tar.bz2
historical-c4d26827e4f45701ab6cc7ef1e9f024907512a26.zip
Revision bump fixing security bugs
Package-Manager: portage-2.1.3.7
Diffstat (limited to 'app-text/tetex')
-rw-r--r--app-text/tetex/ChangeLog12
-rw-r--r--app-text/tetex/Manifest29
-rw-r--r--app-text/tetex/files/digest-tetex-3.0_p1-r49
-rw-r--r--app-text/tetex/files/tetex-3.0_p1-CVE-2007-0650.patch80
-rw-r--r--app-text/tetex/files/tetex-3.0_p1-xpdf-CVE-2007-3387.patch16
-rw-r--r--app-text/tetex/tetex-3.0_p1-r4.ebuild104
6 files changed, 242 insertions, 8 deletions
diff --git a/app-text/tetex/ChangeLog b/app-text/tetex/ChangeLog
index 99023952b5d6..c167cb16624e 100644
--- a/app-text/tetex/ChangeLog
+++ b/app-text/tetex/ChangeLog
@@ -1,6 +1,16 @@
# ChangeLog for app-text/tetex
# Copyright 2002-2007 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/app-text/tetex/ChangeLog,v 1.146 2007/09/01 16:59:06 rbu Exp $
+# $Header: /var/cvsroot/gentoo-x86/app-text/tetex/ChangeLog,v 1.147 2007/09/01 17:16:35 rbu Exp $
+
+*tetex-3.0_p1-r4 (01 Sep 2007)
+
+ 01 Sep 2007; Robert Buchholz <rbu@gentoo.org>
+ +files/tetex-3.0_p1-CVE-2007-0650.patch,
+ +files/tetex-3.0_p1-xpdf-CVE-2007-3387.patch, +tetex-3.0_p1-r4.ebuild:
+ Revision bump fixing security bugs:
+ * 170861: Fix various buffer overflows in tetex's code (CVE-2007-0650)
+ * 182055: Link to system libgd instead of the old one in tarball (CVE-2007-2756)
+ * 188172: Patch for vulnerable XPDF code (CVE-2007-3387)
01 Sep 2007; Robert Buchholz <rbu@gentoo.org> -tetex-3.0-r3.ebuild,
-tetex-3.0-r4.ebuild, -tetex-3.0_p1.ebuild, -tetex-3.0_p1-r1.ebuild,
diff --git a/app-text/tetex/Manifest b/app-text/tetex/Manifest
index 4c7e7523f743..c3b05db05fa2 100644
--- a/app-text/tetex/Manifest
+++ b/app-text/tetex/Manifest
@@ -37,6 +37,10 @@ AUX tetex-3.0-kpathsea-pic.patch 1791 RMD160 30c7da6951977eab26323509b7034a9a1cb
MD5 9d076b2bae179e2870702a15b4c1371d files/tetex-3.0-kpathsea-pic.patch 1791
RMD160 30c7da6951977eab26323509b7034a9a1cb6a809 files/tetex-3.0-kpathsea-pic.patch 1791
SHA256 d00020bd51264210be5425d2392e373b9f3964302e4f24401c398f3704631691 files/tetex-3.0-kpathsea-pic.patch 1791
+AUX tetex-3.0_p1-CVE-2007-0650.patch 2615 RMD160 3e3f55a17e35e3da3a6f77d62939ed66d8ae5222 SHA1 28208eb13f493c1c9c6538f254f04fc0c2aaff1e SHA256 9cb5525070bc4ea0685ac8a2f87df1dbbd2dcee4989e7b22c9897acfe6b67628
+MD5 8c2f3c2c87a5ec82869059df57af27c8 files/tetex-3.0_p1-CVE-2007-0650.patch 2615
+RMD160 3e3f55a17e35e3da3a6f77d62939ed66d8ae5222 files/tetex-3.0_p1-CVE-2007-0650.patch 2615
+SHA256 9cb5525070bc4ea0685ac8a2f87df1dbbd2dcee4989e7b22c9897acfe6b67628 files/tetex-3.0_p1-CVE-2007-0650.patch 2615
AUX tetex-3.0_p1-amd64-xdvik-wp.patch 847 RMD160 e43bb9467e2e2ee072e7b77c755ec91c5a78e515 SHA1 2d2dfc52015b2b62a4eb1fc815edef2dc2c5c03b SHA256 f5dd9e2d2f74591370661992a082c4db92648eab6057435d0a8d377457571bef
MD5 c7d5fd4cce846a7f7e5845ede7b839c9 files/tetex-3.0_p1-amd64-xdvik-wp.patch 847
RMD160 e43bb9467e2e2ee072e7b77c755ec91c5a78e515 files/tetex-3.0_p1-amd64-xdvik-wp.patch 847
@@ -65,6 +69,10 @@ AUX tetex-3.0_p1-texmf-site.patch 1289 RMD160 f7d352494acc84d70e404948310ef445d7
MD5 28bb0330c8f353316b435ed14acac195 files/tetex-3.0_p1-texmf-site.patch 1289
RMD160 f7d352494acc84d70e404948310ef445d79c01b8 files/tetex-3.0_p1-texmf-site.patch 1289
SHA256 b444545ef6ed98d65d18a123c02b8452345fc3808ae7c2f22cf2205627b8f012 files/tetex-3.0_p1-texmf-site.patch 1289
+AUX tetex-3.0_p1-xpdf-CVE-2007-3387.patch 516 RMD160 fcfa307061c6052cec241adda6d7541105afa5bf SHA1 4435c9ccda332826c61d4a839fc608b5857d6cd6 SHA256 7cebc7643f54462de5504aeb6c331860beb9aae947bc80132d0ac8f9b0a2f109
+MD5 ab265d1313af1348b7f431ab5accbcbe files/tetex-3.0_p1-xpdf-CVE-2007-3387.patch 516
+RMD160 fcfa307061c6052cec241adda6d7541105afa5bf files/tetex-3.0_p1-xpdf-CVE-2007-3387.patch 516
+SHA256 7cebc7643f54462de5504aeb6c331860beb9aae947bc80132d0ac8f9b0a2f109 files/tetex-3.0_p1-xpdf-CVE-2007-3387.patch 516
AUX tetex-3.0_p1-xpdf-vulnerabilities.patch 4069 RMD160 e319c2212bdc7883fba436b7ac426cf10d734059 SHA1 82b90be026ba30eb621fdcc354bff23e797565eb SHA256 aa978d95ead2626eba04062b75abaab4a0c90d284a1f62461dc6195ed26e6962
MD5 e70ba402012ed53ab6c0f0d5df28f3df files/tetex-3.0_p1-xpdf-vulnerabilities.patch 4069
RMD160 e319c2212bdc7883fba436b7ac426cf10d734059 files/tetex-3.0_p1-xpdf-vulnerabilities.patch 4069
@@ -120,10 +128,14 @@ EBUILD tetex-3.0_p1-r3.ebuild 2503 RMD160 6acaf9c0c0c32f8abf6697d17f447d2e9a31b9
MD5 7c85a2f21fb595950850bc150922285f tetex-3.0_p1-r3.ebuild 2503
RMD160 6acaf9c0c0c32f8abf6697d17f447d2e9a31b9c9 tetex-3.0_p1-r3.ebuild 2503
SHA256 3eccf88c2da04f11e4ff4267a7f4299b01f78f995479a14c2ac5768ddde60daa tetex-3.0_p1-r3.ebuild 2503
-MISC ChangeLog 25879 RMD160 ebcd55150920287b02ca0046370a5116b5654fb4 SHA1 7d5b21c20cc2c52a3c3114e45c825fa53a3d2580 SHA256 82f28a7effab49ee0dfc88ea29d501b904a5fe662afe492525f2b49fb66c7e2d
-MD5 d2d37a4f930e7e6aa8dabc1202dca59f ChangeLog 25879
-RMD160 ebcd55150920287b02ca0046370a5116b5654fb4 ChangeLog 25879
-SHA256 82f28a7effab49ee0dfc88ea29d501b904a5fe662afe492525f2b49fb66c7e2d ChangeLog 25879
+EBUILD tetex-3.0_p1-r4.ebuild 2727 RMD160 afd0006efea5a0c847ff0b884e1aafbf4cf3ebe6 SHA1 600449a074b02dbb42330fdd59e0ecbc79e44253 SHA256 a2e86a53bdce4ce458b75996ba26d3f1d6a711d2b8881b74cc1cc792766fbeb8
+MD5 50a78fb14e233f7ca6f14de59a9fb723 tetex-3.0_p1-r4.ebuild 2727
+RMD160 afd0006efea5a0c847ff0b884e1aafbf4cf3ebe6 tetex-3.0_p1-r4.ebuild 2727
+SHA256 a2e86a53bdce4ce458b75996ba26d3f1d6a711d2b8881b74cc1cc792766fbeb8 tetex-3.0_p1-r4.ebuild 2727
+MISC ChangeLog 26332 RMD160 32f436abcba8b0fcf134fff616d743374c9ee419 SHA1 7b553180aba9a3b61747dadc6e6a60c15e6c4091 SHA256 5371cf6a06ce6f64f448604676739848c49f2bfda39a061adfd48815a8e17f76
+MD5 ce6c00be8b6c8ad47ec76fab1d56d0f9 ChangeLog 26332
+RMD160 32f436abcba8b0fcf134fff616d743374c9ee419 ChangeLog 26332
+SHA256 5371cf6a06ce6f64f448604676739848c49f2bfda39a061adfd48815a8e17f76 ChangeLog 26332
MISC metadata.xml 156 RMD160 2bf6b2ed9ff0fcef1e902cf093ccf4ae2dcc70a0 SHA1 e9260cd53905d8569cf3327ded4c6d01653fc389 SHA256 b4971b8472ab3fe4fbfe41b331a79193ca19e86c08d055ad1c20eaf9e04b79b6
MD5 504d11dd034a4ba8f06e8e7c633d13ba metadata.xml 156
RMD160 2bf6b2ed9ff0fcef1e902cf093ccf4ae2dcc70a0 metadata.xml 156
@@ -140,10 +152,13 @@ SHA256 6c98bb9cfb053bd9cf0bb0fedb62459df5500fcb1c6e91d8625208574f4a773e files/di
MD5 931c53c1b0eceef55db5b2ff868bb200 files/digest-tetex-3.0_p1-r3 759
RMD160 892c3e3577ad27b94445144dc7a82062c35507b6 files/digest-tetex-3.0_p1-r3 759
SHA256 30ea6f60adc5bae409f275bcf84024f76b81fc6dbad39beccadbdfdf292685c5 files/digest-tetex-3.0_p1-r3 759
+MD5 931c53c1b0eceef55db5b2ff868bb200 files/digest-tetex-3.0_p1-r4 759
+RMD160 892c3e3577ad27b94445144dc7a82062c35507b6 files/digest-tetex-3.0_p1-r4 759
+SHA256 30ea6f60adc5bae409f275bcf84024f76b81fc6dbad39beccadbdfdf292685c5 files/digest-tetex-3.0_p1-r4 759
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
-iD8DBQFG2ZpTyZx3L/ph1soRAkUuAJ4qj2V6kBzNkkifc0n7e7R7vBnoNQCfeOWT
-SdL5Xn48IX+qQtUMYR6eEvY=
-=bA5v
+iD8DBQFG2Z5ryZx3L/ph1soRAltAAJ9//6zt8Xg+4H4Ki4pQDGHG/zoUGwCeMCxn
+0V86vstjRR7oGQy0DL+2Bjk=
+=tf22
-----END PGP SIGNATURE-----
diff --git a/app-text/tetex/files/digest-tetex-3.0_p1-r4 b/app-text/tetex/files/digest-tetex-3.0_p1-r4
new file mode 100644
index 000000000000..393f59b561f4
--- /dev/null
+++ b/app-text/tetex/files/digest-tetex-3.0_p1-r4
@@ -0,0 +1,9 @@
+MD5 24568263880f911452936573211fa4e8 tetex-3.0_p1-gentoo.tar.gz 604
+RMD160 5da9d211792ab81d072f0fed65ac737aa3074a6b tetex-3.0_p1-gentoo.tar.gz 604
+SHA256 4e9236349a6d849db06fefcbbf5af7c333199312b461a06840cb8fd2eddd1ac6 tetex-3.0_p1-gentoo.tar.gz 604
+MD5 0f82ade673335256226d0321e6c5e2cf tetex-src-3.0_p1.tar.gz 13357541
+RMD160 24d5029619675ce597782562bc1b87052235d461 tetex-src-3.0_p1.tar.gz 13357541
+SHA256 e67fff941ba95222ac8f0e17395446723fd78045fc2ff548ca40cc72086a4cc1 tetex-src-3.0_p1.tar.gz 13357541
+MD5 ed9d30d9162d16ac8d5065cde6e0f6fa tetex-texmf-3.0.tar.gz 91402377
+RMD160 a1e87733fa3cbef04e39a690ed8549aeaaddb241 tetex-texmf-3.0.tar.gz 91402377
+SHA256 6c3b8fa619749cbb28ca0f8847e56773d13e0bb92f1ea34287420950373640c2 tetex-texmf-3.0.tar.gz 91402377
diff --git a/app-text/tetex/files/tetex-3.0_p1-CVE-2007-0650.patch b/app-text/tetex/files/tetex-3.0_p1-CVE-2007-0650.patch
new file mode 100644
index 000000000000..4df77e5dd8f1
--- /dev/null
+++ b/app-text/tetex/files/tetex-3.0_p1-CVE-2007-0650.patch
@@ -0,0 +1,80 @@
+--- tetex-src-3.0/texk/makeindexk/mkind.c.CVE-2007-0650 2002-10-02 14:26:37.000000000 +0200
++++ tetex-src-3.0/texk/makeindexk/mkind.c 2007-02-02 12:29:31.000000000 +0100
+@@ -179,7 +179,9 @@
+ argc--;
+ if (argc <= 0)
+ FATAL("Expected -p <num>\n","");
+- strcpy(pageno, *++argv);
++ if (strlen(*++argv) >= sizeof(pageno))
++ FATAL("Page number too high\n","");
++ strcpy(pageno, *argv);
+ init_page = TRUE;
+ if (STREQ(pageno, EVEN)) {
+ log_given = TRUE;
+@@ -230,7 +232,7 @@
+ char tmp[STRING_MAX + 5];
+
+ /* base set by last call to check_idx */
+- sprintf (tmp, "%s%s", base, INDEX_STY);
++ snprintf (tmp, sizeof(tmp), "%s%s", base, INDEX_STY);
+ if (0 == access(tmp, R_OK)) {
+ open_sty (tmp);
+ sty_given = TRUE;
+@@ -405,9 +407,9 @@
+ STRING_MAX,totmem);
+ #endif /* DEBUG */
+
+- if ((idx_fn = (char *) malloc(STRING_MAX)) == NULL)
++ if ((idx_fn = (char *) malloc(STRING_MAX+5)) == NULL)
+ FATAL("Not enough core...abort.\n", "");
+- sprintf(idx_fn, "%s%s", base, INDEX_IDX);
++ snprintf(idx_fn, STRING_MAX+5, "%s%s", base, INDEX_IDX);
+ if ((open_fn &&
+ ((idx_fp = OPEN_IN(idx_fn)) == NULL)
+ ) ||
+@@ -434,7 +436,7 @@
+
+ /* index output file */
+ if (!ind_given) {
+- sprintf(ind, "%s%s", base, INDEX_IND);
++ snprintf(ind, sizeof(ind), "%s%s", base, INDEX_IND);
+ ind_fn = ind;
+ }
+ if ((ind_fp = OPEN_OUT(ind_fn)) == NULL)
+@@ -442,14 +444,14 @@
+
+ /* index transcript file */
+ if (!ilg_given) {
+- sprintf(ilg, "%s%s", base, INDEX_ILG);
++ snprintf(ilg, sizeof(ilg), "%s%s", base, INDEX_ILG);
+ ilg_fn = ilg;
+ }
+ if ((ilg_fp = OPEN_OUT(ilg_fn)) == NULL)
+ FATAL("Can't create transcript file %s.\n", ilg_fn);
+
+ if (log_given) {
+- sprintf(log_fn, "%s%s", base, INDEX_LOG);
++ snprintf(log_fn, sizeof(log_fn), "%s%s", base, INDEX_LOG);
+ if ((log_fp = OPEN_IN(log_fn)) == NULL) {
+ FATAL("Source log file %s not found.\n", log_fn);
+ } else {
+@@ -505,6 +507,9 @@
+ if ((found = kpse_find_file (fn, kpse_ist_format, 1)) == NULL) {
+ FATAL("Index style file %s not found.\n", fn);
+ } else {
++ if (strlen(found) >= sizeof(sty_fn)) {
++ FATAL("Style file %s too long.\n", found);
++ }
+ strcpy(sty_fn,found);
+ if ((sty_fp = OPEN_IN(sty_fn)) == NULL) {
+ FATAL("Could not open style file %s.\n", sty_fn);
+@@ -512,6 +517,9 @@
+ }
+ #else
+ if ((path = getenv(STYLE_PATH)) == NULL) {
++ if (strlen(fn) >= sizeof(sty_fn)) {
++ FATAL("Style file %s too long.\n", fn);
++ }
+ /* style input path not defined */
+ strcpy(sty_fn, fn);
+ sty_fp = OPEN_IN(sty_fn);
diff --git a/app-text/tetex/files/tetex-3.0_p1-xpdf-CVE-2007-3387.patch b/app-text/tetex/files/tetex-3.0_p1-xpdf-CVE-2007-3387.patch
new file mode 100644
index 000000000000..da3c7a6d19f7
--- /dev/null
+++ b/app-text/tetex/files/tetex-3.0_p1-xpdf-CVE-2007-3387.patch
@@ -0,0 +1,16 @@
+--- tetex-src-3.0/libs/xpdf/xpdf/Stream.cc Tue Feb 27 14:05:52 2007
++++ tetex-src-3.0/libs/xpdf/xpdf/Stream.cc Thu Jul 12 15:55:49 2007
+@@ -421,7 +421,12 @@
+ }
+ pixBytes = (nComps * nBits + 7) >> 3;
+ rowBytes = ((totalBits + 7) >> 3) + pixBytes;
+- if (rowBytes < 0) {
++ if (width <= 0 || nComps <= 0 || nBits <= 0 ||
++ nComps > gfxColorMaxComps ||
++ nBits > 16 ||
++ nVals <= 0 ||
++ nVals * nBits + 7 <= 0 ||
++ rowBytes <= 0) {
+ return;
+ }
+ predLine = (Guchar *)gmalloc(rowBytes);
diff --git a/app-text/tetex/tetex-3.0_p1-r4.ebuild b/app-text/tetex/tetex-3.0_p1-r4.ebuild
new file mode 100644
index 000000000000..fb48765dabeb
--- /dev/null
+++ b/app-text/tetex/tetex-3.0_p1-r4.ebuild
@@ -0,0 +1,104 @@
+# Copyright 1999-2007 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/app-text/tetex/tetex-3.0_p1-r4.ebuild,v 1.1 2007/09/01 17:16:35 rbu Exp $
+
+inherit tetex-3 flag-o-matic versionator virtualx
+
+SMALL_PV=$(get_version_component_range 1-2 ${PV})
+TETEX_TEXMF_PV=${SMALL_PV}
+S="${WORKDIR}/tetex-src-${SMALL_PV}"
+
+TETEX_SRC="tetex-src-${PV}.tar.gz"
+TETEX_TEXMF="tetex-texmf-${TETEX_TEXMF_PV:-${TETEX_PV}}.tar.gz"
+#TETEX_TEXMF_SRC="tetex-texmfsrc-${TETEX_TEXMF_PV:-${TETEX_PV}}.tar.gz"
+TETEX_TEXMF_SRC=""
+
+DESCRIPTION="a complete TeX distribution"
+HOMEPAGE="http://tug.org/teTeX/"
+
+SRC_PATH_TETEX=ftp://cam.ctan.org/tex-archive/systems/unix/teTeX/current/distrib
+SRC_URI="mirror://gentoo/${TETEX_SRC}
+ ${SRC_PATH_TETEX}/${TETEX_TEXMF}
+ mirror://gentoo/${P}-gentoo.tar.gz"
+
+KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd"
+
+# these are defined in tetex.eclass and tetex-3.eclass
+IUSE=""
+DEPEND="${DEPEND} media-libs/gd"
+RDEPEND="${RDEPEND} media-libs/gd"
+
+src_unpack() {
+ tetex-3_src_unpack
+ cd "${S}"
+ epatch ${FILESDIR}/${PN}-${SMALL_PV}-kpathsea-pic.patch
+
+ # bug 85404
+ epatch ${FILESDIR}/${PN}-${SMALL_PV}-epstopdf-wrong-rotation.patch
+
+ epatch ${FILESDIR}/${P}-amd64-xdvik-wp.patch
+ epatch ${FILESDIR}/${P}-mptest.patch
+
+ #bug 98029
+ epatch ${FILESDIR}/${P}-fmtutil-etex.patch
+
+ #bug 115775
+ epatch ${FILESDIR}/${P}-xpdf-vulnerabilities.patch
+
+ # bug 94860
+ epatch ${FILESDIR}/${P}-pdftosrc-install.patch
+
+ # bug 126918
+ epatch ${FILESDIR}/${P}-create-empty-files.patch
+
+ # bug 94901
+ epatch ${FILESDIR}/${P}-dvipdfm-timezone.patch
+
+ # security bug #170861
+ epatch ${FILESDIR}/${P}-CVE-2007-0650.patch
+
+ # security bug #188172
+ epatch ${FILESDIR}/${P}-xpdf-CVE-2007-3387.patch
+
+ # Construct a Gentoo site texmf directory
+ # that overlays the upstream supplied
+ epatch ${FILESDIR}/${P}-texmf-site.patch
+}
+
+src_compile() {
+ #bug 119856
+ export LC_ALL=C
+
+ # dvipng has its own ebuild (fix for bug #129044).
+ # also, do not build against own lib gd (security #182055)
+ TETEX_ECONF="${TETEX_ECONF} --without-dvipng --with-system-gd"
+
+ tetex-3_src_compile
+}
+
+src_test() {
+ fmtutil --fmtdir "${S}/texk/web2c" --all
+ # The check target tries to access X display, bug #69439.
+ Xmake check || die "Xmake check failed."
+}
+
+src_install() {
+ insinto /usr/share/texmf/dvips/pstricks
+ doins ${FILESDIR}/pst-circ.pro
+
+ # install pdftosrc man page, bug 94860
+ doman ${S}/texk/web2c/pdftexdir/pdftosrc.1
+
+ tetex-3_src_install
+
+ # Create Gentoo site texmf directory
+ keepdir /usr/share/texmf-site
+}
+
+pkg_postinst() {
+ tetex-3_pkg_postinst
+
+ elog
+ elog "This release removes dvipng since it is provided in app-text/dvipng"
+ elog
+}