head 1.2; access; symbols pkgsrc-2013Q2:1.2.0.8 pkgsrc-2013Q2-base:1.2 pkgsrc-2012Q4:1.2.0.6 pkgsrc-2012Q4-base:1.2 pkgsrc-2011Q4:1.2.0.4 pkgsrc-2011Q4-base:1.2 pkgsrc-2011Q2:1.2.0.2 pkgsrc-2011Q2-base:1.2; locks; strict; comment @# @; 1.2 date 2011.03.08.17.09.25; author drochner; state dead; branches; next 1.1; 1.1 date 2011.01.31.17.44.31; author drochner; state Exp; branches; next ; desc @@ 1.2 log @update to 0.8 no changelog available, at least some security fixes were done: -fix possible memory corruption due to malformed JPEG images (was patched in pkgsrc) -fix (at least) 2 cases of integer overflow in array allocation (SA42320) @ text @$NetBSD: patch-ad,v 1.1 2011/01/31 17:44:31 drochner Exp $ http://secunia.com/advisories/43020/ --- fitz/filt_dctd.c.orig 2010-08-25 14:12:11.000000000 +0000 +++ fitz/filt_dctd.c @@@@ -182,8 +182,18 @@@@ static void closedctd(fz_stream *stm) { fz_dctd *state = stm->state; + + if (setjmp(state->jb)) + { + state->chain->rp = state->chain->wp - state->cinfo.src->bytes_in_buffer; + fz_warn("jpeg error: %s", state->msg); + goto skip; + } + if (state->init) jpeg_finish_decompress(&state->cinfo); + +skip: state->chain->rp = state->chain->wp - state->cinfo.src->bytes_in_buffer; jpeg_destroy_decompress(&state->cinfo); fz_free(state->scanline); @ 1.1 log @add patch from upstream to fix possible memory corruption due to malformed JPEG images (SA43020) @ text @d1 1 a1 1 $NetBSD$ @