From a1922d0ec660fdc1892f2783515f781c090df0a9 Mon Sep 17 00:00:00 2001 From: root Date: Fri, 20 Jan 2012 23:14:48 +0000 Subject: Fri Jan 20 23:14:48 UTC 2012 --- multilib-staging/lib32-libtiff/PKGBUILD | 41 ++++++++++++++++++++++ .../lib32-libtiff/libtiff-CVE-2009-2285.patch | 22 ++++++++++++ 2 files changed, 63 insertions(+) create mode 100644 multilib-staging/lib32-libtiff/PKGBUILD create mode 100644 multilib-staging/lib32-libtiff/libtiff-CVE-2009-2285.patch (limited to 'multilib-staging/lib32-libtiff') diff --git a/multilib-staging/lib32-libtiff/PKGBUILD b/multilib-staging/lib32-libtiff/PKGBUILD new file mode 100644 index 000000000..2d6eb6a8e --- /dev/null +++ b/multilib-staging/lib32-libtiff/PKGBUILD @@ -0,0 +1,41 @@ +# $Id: PKGBUILD 62312 2012-01-19 07:50:29Z bluewind $ +# Maintainer: Eric Belanger +# Contributor: dorphell + +_pkgbasename=libtiff +pkgname=lib32-$_pkgbasename +pkgver=4.0.0 +pkgrel=1 +pkgdesc="Library for manipulation of TIFF images (32-bit)" +arch=('x86_64') +url="http://www.remotesensing.org/libtiff/" +license=('custom') +depends=('lib32-libjpeg' 'lib32-zlib' $_pkgbasename) +makedepends=(gcc-multilib) +options=('!libtool') +source=(ftp://ftp.remotesensing.org/pub/libtiff/tiff-${pkgver}.tar.gz) +sha1sums=('85d85520fea40fc9291995a60e3d40cf980b5522') + +build() { + export CC="gcc -m32" + export CXX="g++ -m32" + export PKG_CONFIG_PATH="/usr/lib32/pkgconfig" + + cd "${srcdir}/tiff-${pkgver}" + ./configure --prefix=/usr --sysconfdir=/etc --mandir=/usr/share/man --libdir=/usr/lib32 + make +} + +check() { + cd "${srcdir}/tiff-${pkgver}" + make check +} + +package() { + cd "${srcdir}/tiff-${pkgver}" + make DESTDIR="${pkgdir}" install + + rm -rf "${pkgdir}"/usr/{include,share,bin} + mkdir -p "$pkgdir/usr/share/licenses" + ln -s $_pkgbasename "$pkgdir/usr/share/licenses/$pkgname" +} diff --git a/multilib-staging/lib32-libtiff/libtiff-CVE-2009-2285.patch b/multilib-staging/lib32-libtiff/libtiff-CVE-2009-2285.patch new file mode 100644 index 000000000..435a84b53 --- /dev/null +++ b/multilib-staging/lib32-libtiff/libtiff-CVE-2009-2285.patch @@ -0,0 +1,22 @@ +Index: tiff-3.8.2/libtiff/tif_lzw.c +=================================================================== +--- tiff-3.8.2.orig/libtiff/tif_lzw.c ++++ tiff-3.8.2/libtiff/tif_lzw.c +@@ -421,7 +421,7 @@ LZWDecode(TIFF* tif, tidata_t op0, tsize + NextCode(tif, sp, bp, code, GetNextCode); + if (code == CODE_EOI) + break; +- if (code == CODE_CLEAR) { ++ if (code >= CODE_CLEAR) { + TIFFErrorExt(tif->tif_clientdata, tif->tif_name, + "LZWDecode: Corrupted LZW table at scanline %d", + tif->tif_row); +@@ -624,7 +624,7 @@ LZWDecodeCompat(TIFF* tif, tidata_t op0, + NextCode(tif, sp, bp, code, GetNextCodeCompat); + if (code == CODE_EOI) + break; +- if (code == CODE_CLEAR) { ++ if (code >= CODE_CLEAR) { + TIFFErrorExt(tif->tif_clientdata, tif->tif_name, + "LZWDecode: Corrupted LZW table at scanline %d", + tif->tif_row); -- cgit v1.2.3-54-g00ecf