head 1.4; access; symbols pkgsrc-2013Q2:1.4.0.4 pkgsrc-2013Q2-base:1.4 pkgsrc-2012Q4:1.4.0.2 pkgsrc-2012Q4-base:1.4 pkgsrc-2012Q3:1.3.0.20 pkgsrc-2012Q3-base:1.3 pkgsrc-2012Q2:1.3.0.18 pkgsrc-2012Q2-base:1.3 pkgsrc-2012Q1:1.3.0.16 pkgsrc-2012Q1-base:1.3 pkgsrc-2011Q4:1.3.0.14 pkgsrc-2011Q4-base:1.3 pkgsrc-2011Q3:1.3.0.12 pkgsrc-2011Q3-base:1.3 pkgsrc-2011Q2:1.3.0.10 pkgsrc-2011Q2-base:1.3 pkgsrc-2011Q1:1.3.0.8 pkgsrc-2011Q1-base:1.3 pkgsrc-2010Q4:1.3.0.6 pkgsrc-2010Q4-base:1.3 pkgsrc-2010Q3:1.3.0.4 pkgsrc-2010Q3-base:1.3 pkgsrc-2010Q2:1.3.0.2 pkgsrc-2009Q4:1.2.0.22 pkgsrc-2009Q4-base:1.2 pkgsrc-2008Q4:1.2.0.20 pkgsrc-2008Q4-base:1.2 pkgsrc-2008Q3:1.2.0.18 pkgsrc-2008Q3-base:1.2 cube-native-xorg:1.2.0.16 cube-native-xorg-base:1.2 pkgsrc-2008Q2:1.2.0.14 pkgsrc-2008Q2-base:1.2 pkgsrc-2008Q1:1.2.0.12 pkgsrc-2008Q1-base:1.2 pkgsrc-2007Q4:1.2.0.10 pkgsrc-2007Q4-base:1.2 pkgsrc-2007Q3:1.2.0.8 pkgsrc-2007Q3-base:1.2 pkgsrc-2007Q2:1.2.0.6 pkgsrc-2007Q2-base:1.2 pkgsrc-2007Q1:1.2.0.4 pkgsrc-2007Q1-base:1.2 pkgsrc-2006Q4:1.2.0.2 pkgsrc-2006Q4-base:1.2 pkgsrc-2006Q3:1.1.0.8 pkgsrc-2006Q3-base:1.1 pkgsrc-2006Q2:1.1.0.6 pkgsrc-2006Q2-base:1.1 pkgsrc-2006Q1:1.1.0.4 pkgsrc-2006Q1-base:1.1 pkgsrc-2005Q4:1.1.0.2 pkgsrc-2005Q4-base:1.1; locks; strict; comment @# @; 1.4 date 2012.10.08.05.40.11; author mef; state dead; branches; next 1.3; 1.3 date 2010.06.30.12.44.55; author tron; state Exp; branches 1.3.2.1; next 1.2; 1.2 date 2006.12.27.18.18.22; author joerg; state dead; branches; next 1.1; 1.1 date 2005.12.09.20.30.16; author wiz; state Exp; branches; next ; 1.3.2.1 date 2010.06.30.12.44.55; author agc; state dead; branches; next 1.3.2.2; 1.3.2.2 date 2010.07.04.07.24.39; author agc; state Exp; branches; next ; desc @@ 1.4 log @To-be-deleted file existed, sorry, cvs delete them @ text @$NetBSD: patch-bb,v 1.3 2010/06/30 12:44:55 tron Exp $ Fix for security vulnerability reported in CVE-2010-1628 taken from here: http://bugs.ghostscript.com/attachment.cgi?id=6350 --- psi/isave.c.orig 2008-08-28 23:48:19.000000000 +0100 +++ psi/isave.c 2010-06-30 13:31:32.000000000 +0100 @@@@ -156,22 +156,6 @@@@ /* A link to igcref.c . */ ptr_proc_reloc(igc_reloc_ref_ptr_nocheck, ref_packed); -/* - * Structure for saved change chain for save/restore. Because of the - * garbage collector, we need to distinguish the cases where the change - * is in a static object, a dynamic ref, or a dynamic struct. - */ -typedef struct alloc_change_s alloc_change_t; -struct alloc_change_s { - alloc_change_t *next; - ref_packed *where; - ref contents; -#define AC_OFFSET_STATIC (-2) /* static object */ -#define AC_OFFSET_REF (-1) /* dynamic ref */ -#define AC_OFFSET_ALLOCATED (-3) /* a newly allocated ref array */ - short offset; /* if >= 0, offset within struct */ -}; - static CLEAR_MARKS_PROC(change_clear_marks) { @@@@ -519,7 +503,7 @@@@ /* Allocate a structure for recording an allocation event. */ int -alloc_save_change_alloc(gs_ref_memory_t *mem, client_name_t cname, ref_packed ***ppr) +alloc_save_change_alloc(gs_ref_memory_t *mem, client_name_t cname, alloc_change_t **pcp) { register alloc_change_t *cp; @@@@ -533,8 +517,7 @@@@ cp->where = 0; cp->offset = AC_OFFSET_ALLOCATED; make_null(&cp->contents); - mem->changes = cp; - *ppr = &cp->where; + *pcp = cp; return 1; } @ 1.3 log @Add a fix for the security vulnerability reported in CVE-2010-1628 taken from the Ghostscript Bugzilla. @ text @d1 1 a1 1 $NetBSD$ @ 1.3.2.1 log @file patch-bb was added on branch pkgsrc-2010Q2 on 2010-07-04 07:24:39 +0000 @ text @d1 50 @ 1.3.2.2 log @Pullup previous changes on HEAD to pkgsrc-2010Q2 branch to fix branching error, and to sync with reality. @ text @a0 50 $NetBSD: patch-bb,v 1.3 2010/06/30 12:44:55 tron Exp $ Fix for security vulnerability reported in CVE-2010-1628 taken from here: http://bugs.ghostscript.com/attachment.cgi?id=6350 --- psi/isave.c.orig 2008-08-28 23:48:19.000000000 +0100 +++ psi/isave.c 2010-06-30 13:31:32.000000000 +0100 @@@@ -156,22 +156,6 @@@@ /* A link to igcref.c . */ ptr_proc_reloc(igc_reloc_ref_ptr_nocheck, ref_packed); -/* - * Structure for saved change chain for save/restore. Because of the - * garbage collector, we need to distinguish the cases where the change - * is in a static object, a dynamic ref, or a dynamic struct. - */ -typedef struct alloc_change_s alloc_change_t; -struct alloc_change_s { - alloc_change_t *next; - ref_packed *where; - ref contents; -#define AC_OFFSET_STATIC (-2) /* static object */ -#define AC_OFFSET_REF (-1) /* dynamic ref */ -#define AC_OFFSET_ALLOCATED (-3) /* a newly allocated ref array */ - short offset; /* if >= 0, offset within struct */ -}; - static CLEAR_MARKS_PROC(change_clear_marks) { @@@@ -519,7 +503,7 @@@@ /* Allocate a structure for recording an allocation event. */ int -alloc_save_change_alloc(gs_ref_memory_t *mem, client_name_t cname, ref_packed ***ppr) +alloc_save_change_alloc(gs_ref_memory_t *mem, client_name_t cname, alloc_change_t **pcp) { register alloc_change_t *cp; @@@@ -533,8 +517,7 @@@@ cp->where = 0; cp->offset = AC_OFFSET_ALLOCATED; make_null(&cp->contents); - mem->changes = cp; - *ppr = &cp->where; + *pcp = cp; return 1; } @ 1.2 log @Update to gpl ghostscript-8.54 aka print/ghostscript-afpl relaunched under GPL with options.mk. This was discussed on tech-pkg@@. @ text @d1 1 a1 1 $NetBSD: patch-bb,v 1.1 2005/12/09 20:30:16 wiz Exp $ d3 37 a39 3 --- lib/ps2epsi.orig 2000-03-09 08:40:40.000000000 +0000 +++ lib/ps2epsi @@@@ -3,3 +3,4 @@@@ d41 9 a49 3 -tmpfile=/tmp/ps2epsi$$ +tmpfile=`mktemp -t ps2epsi.XXXXXX || exit 1` +trap "rm -rf $tmpfile" 0 1 2 3 7 13 15 @ 1.1 log @Add x11 option to the various ghostscript packages, and get rid of the separate ghostscript*x11* packages. @ text @d1 1 a1 1 $NetBSD: patch-bb,v 1.1 2005/11/27 17:08:31 adrianp Exp $ @