Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 89115 Details for
Bug 124828
media-libs/freetype: integer overflows (CVE-2006-{0747|1861|2493|2661})
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
freetype-2.1.10-r1.ebuild
freetype-2.1.10-r1.ebuild (text/plain), 2.04 KB, created by
Donnie Berkholz (RETIRED)
on 2006-06-13 21:09:50 UTC
(
hide
)
Description:
freetype-2.1.10-r1.ebuild
Filename:
MIME Type:
Creator:
Donnie Berkholz (RETIRED)
Created:
2006-06-13 21:09:50 UTC
Size:
2.04 KB
patch
obsolete
># Copyright 1999-2006 Gentoo Foundation ># Distributed under the terms of the GNU General Public License v2 ># $Header: /var/cvsroot/gentoo-x86/media-libs/freetype/freetype-2.1.10.ebuild,v 1.6 2006/03/31 19:54:28 flameeyes Exp $ > >inherit eutils flag-o-matic gnuconfig libtool > >SPV="`echo ${PV} | cut -d. -f1,2`" > >DESCRIPTION="A high-quality and portable font engine" >HOMEPAGE="http://www.freetype.org/" >SRC_URI="mirror://sourceforge/freetype/${P/_/}.tar.bz2 > doc? ( mirror://sourceforge/${PN}/${PN}-doc-${PV}.tar.bz2 )" > >LICENSE="FTL GPL-2" >SLOT="2" >KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc-macos ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd" >IUSE="zlib bindist doc" > ># The RDEPEND below makes sure that if there is a version of moz/ff/tb ># installed, then it will have the freetype-2.1.8+ binary compatibility patch. ># Otherwise updating freetype will cause moz/ff/tb crashes. #59849 ># 20 Nov 2004 agriffis >DEPEND="zlib? ( sys-libs/zlib )" > >RDEPEND="${DEPEND} > !<www-client/mozilla-1.7.3-r3 > !<www-client/mozilla-firefox-1.0-r3 > !<mail-client/mozilla-thunderbird-0.9-r3 > !<media-libs/libwmf-0.2.8.2" > >src_unpack() { > > unpack ${A} > cd ${S} > > # fix internal header cast which gets used by pango (bad) > epatch ${FILESDIR}/${P}-internal_header.patch > > # Security fixes, patches from Debian > epatch ${FILESDIR}/CVE-2006-0747_integer-underflows.diff > epatch ${FILESDIR}/CVE-2006-0747_nullpointer-deref.diff > epatch ${FILESDIR}/CVE-2006-1861_integer-overflows.diff > epatch ${FILESDIR}/CVE-2006-2493_integer-overflows.diff > > gnuconfig_update ${S} > elibtoolize > epunt_cxx > >} > >src_compile() { > > # https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=118021 > append-flags "-fno-strict-aliasing" > > use bindist || append-flags -DTT_CONFIG_OPTION_BYTECODE_INTERPRETER > > make setup CFG="--host=${CHOST} --prefix=/usr `use_with zlib` --libdir=/usr/$(get_libdir)" unix || die > > emake || die > >} > >src_install() { > > make DESTDIR="${D}" install || die > > dodoc ChangeLog README > dodoc docs/{CHANGES,CUSTOMIZE,DEBUG,*.txt,PATENTS,TODO} > > cd ${WORKDIR}/${PN}-doc-${PV} > use doc && dohtml -r docs/* > >}
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 124828
:
86118
|
86119
|
86120
|
86121
|
86122
|
86123
|
86201
|
89111
|
89112
|
89113
|
89114
| 89115