1 |
pva 09/04/05 20:08:08 |
2 |
|
3 |
Added: ghostscript-gnu-8.62.0-CVE-misc.patch |
4 |
Log: |
5 |
Fixed multiple vulnerabilities, bug #264614, thank Robert Buchholz for report. |
6 |
(Portage version: 2.2_rc28/cvs/Linux i686) |
7 |
|
8 |
Revision Changes Path |
9 |
1.1 app-text/ghostscript-gnu/files/ghostscript-gnu-8.62.0-CVE-misc.patch |
10 |
|
11 |
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/app-text/ghostscript-gnu/files/ghostscript-gnu-8.62.0-CVE-misc.patch?rev=1.1&view=markup |
12 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/app-text/ghostscript-gnu/files/ghostscript-gnu-8.62.0-CVE-misc.patch?rev=1.1&content-type=text/plain |
13 |
|
14 |
Index: ghostscript-gnu-8.62.0-CVE-misc.patch |
15 |
=================================================================== |
16 |
https://bugs.gentoo.org/show_bug.cgi?id=264614 |
17 |
|
18 |
--- src/scfd.c 2008/07/28 22:23:04 8895 |
19 |
+++ src/scfd.c 2008/07/29 04:44:05 8896 |
20 |
@@ -161,7 +161,7 @@ |
21 |
/* makeup codes efficiently, since these are always a multiple of 64. */ |
22 |
#define invert_data(rlen, black_byte, makeup_action, d)\ |
23 |
if ( rlen > qbit )\ |
24 |
- { *q++ ^= (1 << qbit) - 1;\ |
25 |
+ { if (q >= ss->lbuf) *q++ ^= (1 << qbit) - 1; else q++;\ |
26 |
rlen -= qbit;\ |
27 |
switch ( rlen >> 3 )\ |
28 |
{\ |
29 |
--- src/gdevpdtb.c 2009-04-05 23:45:35.000000000 +0400 |
30 |
+++ src/gdevpdtb.c 2009-04-05 23:45:46.000000000 +0400 |
31 |
@@ -137,7 +137,7 @@ |
32 |
&st_pdf_base_font, "pdf_base_font_alloc"); |
33 |
const gs_font_name *pfname = &font->font_name; |
34 |
gs_const_string font_name; |
35 |
- char fnbuf[3 + sizeof(long) / 3 + 1]; /* .F#######\0 */ |
36 |
+ char fnbuf[2*sizeof(long) + 3]; /* .F########\0 */ |
37 |
int code; |
38 |
|
39 |
if (pbfont == 0) |