public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] repo/gentoo:master commit in: media-gfx/gimp/files/
@ 2016-12-22 16:04 Michael Palimaka
  0 siblings, 0 replies; 3+ messages in thread
From: Michael Palimaka @ 2016-12-22 16:04 UTC (permalink / raw
  To: gentoo-commits

commit:     3fcb9e3eb9d375eee2bbcf9cb16501efaf980cfc
Author:     Michael Mair-Keimberger (asterix) <m.mairkeimberger <AT> gmail <DOT> com>
AuthorDate: Tue Dec 20 19:13:25 2016 +0000
Commit:     Michael Palimaka <kensington <AT> gentoo <DOT> org>
CommitDate: Thu Dec 22 16:04:42 2016 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=3fcb9e3e

media-gfx/gimp: remove unused patches

 media-gfx/gimp/files/gimp-2.6.11-file-uri.patch    |  79 ----
 .../gimp/files/gimp-2.6.12-CVE-2012-2763.patch     |  20 -
 .../gimp/files/gimp-2.6.12-CVE-2012-3236.patch     |  39 --
 .../gimp/files/gimp-2.6.12-CVE-2012-3403.patch     | 511 ---------------------
 .../gimp/files/gimp-2.6.12-CVE-2012-3481.patch     |  56 ---
 .../gimp/files/gimp-2.6.12-potfiles-skip.patch     |  17 -
 .../gimp/files/gimp-2.8.10-CVE-2013-1913.patch     |  31 --
 .../gimp/files/gimp-2.8.10-CVE-2013-1978.patch     | 151 ------
 media-gfx/gimp/files/gimp-2.8.10-freetype251.patch |  26 --
 media-gfx/gimp/files/gimp-curl-headers.diff        |  12 -
 10 files changed, 942 deletions(-)

diff --git a/media-gfx/gimp/files/gimp-2.6.11-file-uri.patch b/media-gfx/gimp/files/gimp-2.6.11-file-uri.patch
deleted file mode 100644
index 2d3f161..00000000
--- a/media-gfx/gimp/files/gimp-2.6.11-file-uri.patch
+++ /dev/null
@@ -1,79 +0,0 @@
---- plug-ins/file-uri/uri-backend-libcurl.c.orig	2011-09-01 09:06:13.307741499 -0500
-+++ plug-ins/file-uri/uri-backend-libcurl.c	2011-09-01 09:09:09.066152187 -0500
-@@ -62,7 +62,7 @@
- 
-   vinfo = curl_version_info (CURLVERSION_NOW);
- 
--  protocols = g_string_new ("http:,ftp:");
-+  protocols = g_string_new ("http:,ftp:,gopher:");
- 
-   if (vinfo->features & CURL_VERSION_SSL)
-     {
-@@ -153,6 +153,11 @@
-   CURL      *curl_handle;
-   CURLcode   result;
-   gint       response_code;
-+  gchar     *eff_url   = NULL;
-+  gchar     *proto     = NULL;
-+  gboolean   is_http   = FALSE;
-+  gboolean   is_ftp    = FALSE;
-+  gboolean   is_gopher = FALSE;
- 
-   gimp_progress_init (_("Connecting to server"));
- 
-@@ -194,13 +199,52 @@
- 
-   curl_easy_getinfo (curl_handle, CURLINFO_RESPONSE_CODE, &response_code);
- 
--  if (response_code != 200)
-+  /* protocol could be not specified in provided uri
-+     get complete url guessed by curl */
-+  curl_easy_getinfo (curl_handle, CURLINFO_EFFECTIVE_URL, &eff_url);
-+
-+  /* detect uri protocol */
-+  if (! g_ascii_strncasecmp (eff_url, "http://", 7))
-+    {
-+      is_http = TRUE;
-+      proto = "HTTP";
-+    }
-+  else
-+  if (! g_ascii_strncasecmp (eff_url, "https://", 8))
-+    {
-+      is_http = TRUE;
-+      proto = "HTTPS";
-+    }
-+  else
-+  if (! g_ascii_strncasecmp (eff_url, "ftp://", 6))
-+    {
-+      is_ftp = TRUE;
-+      proto = "FTP";
-+    }
-+  else
-+  if (! g_ascii_strncasecmp (eff_url, "ftps://", 7))
-+    {
-+      is_ftp = TRUE;
-+      proto = "FTPS";
-+    }
-+  else
-+  if (! g_ascii_strncasecmp (eff_url ,"gopher://", 9))
-+    {
-+      is_gopher = TRUE;
-+      proto = "GOPHER";
-+    }
-+  else
-+    {
-+      proto = "UNKNOWN";
-+    }
-+
-+  if (! ((is_http && response_code == 200) || (is_ftp && response_code == 226) || (is_gopher)))
-     {
-       fclose (out_file);
-       g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
--                   _("Opening '%s' for reading resulted in HTTP "
-+                   _("Opening '%s' for reading resulted in %s "
-                      "response code: %d"),
--                   uri, response_code);
-+                   uri, proto, response_code);
-       curl_easy_cleanup (curl_handle);
-       return FALSE;
-     }

diff --git a/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-2763.patch b/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-2763.patch
deleted file mode 100644
index c922b63..00000000
--- a/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-2763.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-Fix for CVE-2012-2763 for GIMP 2.6.x by mancha. Based on commit
-76155d79df8d497. Thanks to muks, Kevin, and Ankh for identifying
-the relevant code change.
-
-Ref: Fixed potential buffer overflow in readstr_upto().
-
-================================================
-
---- a/plug-ins/script-fu/tinyscheme/scheme.c.orig	2012-06-30
-+++ b/plug-ins/script-fu/tinyscheme/scheme.c		2012-06-30
-@@ -1727,7 +1727,8 @@ static char *readstr_upto(scheme *sc, ch
-     c = inchar(sc);
-     len = g_unichar_to_utf8(c, p);
-     p += len;
--  } while (c && !is_one_of(delim, c));
-+  } while ((p - sc->strbuff < sizeof(sc->strbuff)) &&
-+           (c && !is_one_of(delim, c)));
- 
-   if(p==sc->strbuff+2 && c_prev=='\\')
-     *p = '\0';

diff --git a/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3236.patch b/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3236.patch
deleted file mode 100644
index e4d3a9f..00000000
--- a/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3236.patch
+++ /dev/null
@@ -1,39 +0,0 @@
-From ace45631595e8781a1420842582d67160097163c Mon Sep 17 00:00:00 2001
-From: Michael Natterer <mitch@gimp.org>
-Date: Wed, 06 Jun 2012 19:21:10 +0000
-Subject: Bug 676804 - file handling DoS for fit file format
-
-Apply patch from joe@reactionis.co.uk which fixes a buffer overflow on
-broken/malicious fits files.
----
-(limited to 'plug-ins/file-fits/fits-io.c')
-
-diff --git a/plug-ins/file-fits/fits-io.c b/plug-ins/file-fits/fits-io.c
-index 03d9652..ed77318 100644
---- a/plug-ins/file-fits/fits-io.c
-+++ b/plug-ins/file-fits/fits-io.c
-@@ -1054,10 +1054,18 @@ static FITS_HDU_LIST *fits_decode_header (FITS_RECORD_LIST *hdr,
-  hdulist->used.simple = (strncmp (hdr->data, "SIMPLE  ", 8) == 0);
-  hdulist->used.xtension = (strncmp (hdr->data, "XTENSION", 8) == 0);
-  if (hdulist->used.xtension)
-- {
--   fdat = fits_decode_card (fits_search_card (hdr, "XTENSION"), typ_fstring);
--   strcpy (hdulist->xtension, fdat->fstring);
-- }
-+   {
-+     fdat = fits_decode_card (fits_search_card (hdr, "XTENSION"), typ_fstring);
-+     if (fdat != NULL)
-+       {
-+         strcpy (hdulist->xtension, fdat->fstring);
-+       }
-+     else
-+       {
-+         strcpy (errmsg, "No valid XTENSION header found.");
-+         goto err_return;
-+       }
-+   }
- 
-  FITS_DECODE_CARD (hdr, "NAXIS", fdat, typ_flong);
-  hdulist->naxis = fdat->flong;
---
-cgit v0.9.0.2

diff --git a/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3403.patch b/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3403.patch
deleted file mode 100644
index f7d0b37..00000000
--- a/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3403.patch
+++ /dev/null
@@ -1,511 +0,0 @@
-From 65ac6cda675fafd57bc182175f685e5d8c1a9cc9 Mon Sep 17 00:00:00 2001
-From: Nils Philippsen <nils@redhat.com>
-Date: Mon, 20 Aug 2012 15:28:44 +0200
-Subject: [PATCH] patch: CVE-2012-3403
-
-Squashed commit of the following:
-
-commit d002e513039a9667a06d3e2ba180f9c18785cc5f
-Author: Nils Philippsen <nils@redhat.com>
-Date:   Fri Jul 13 15:47:16 2012 +0200
-
-    file-cel: close file on error
-
-commit ec3f1fe7586527ea7e2735b5c8548b925f622d5b
-Author: Nils Philippsen <nils@redhat.com>
-Date:   Fri Jul 13 15:33:27 2012 +0200
-
-    file-cel: use g_set_error() for errors instead of g_message()
-    (cherry picked from commit 86f4cd39bd493c88a7a19b56d1827d8b911e07f6)
-
-    Conflicts:
-        plug-ins/common/file-cel.c
-
-commit 79bd89bc39195974d5cae2c2b06c829dd90c36ee
-Author: Nils Philippsen <nils@redhat.com>
-Date:   Fri Jul 13 15:30:44 2012 +0200
-
-    file-cel: use statically allocated palette buffer
-    (cherry picked from commit 69b98191cf315bcf0f7b8878896c01600e67c124)
-
-commit 52d85468980b5947cfd3e84f9a256769158210cc
-Author: Nils Philippsen <nils@redhat.com>
-Date:   Fri Jul 13 15:20:06 2012 +0200
-
-    file-cel: validate header data (CVE-2012-3403)
-    (cherry picked from commit b772d1b84c9272bb46ab9a21db4390e6263c9892)
-
-commit 62da97876070839097671e83eb8f5d408515396f
-Author: Nils Philippsen <nils@redhat.com>
-Date:   Thu Jul 12 15:50:02 2012 +0200
-
-    file-cel: check fread()/g_fopen() return values and pass on errors
-    (cherry picked from commit 797db58b94c64f418c35d38b7a608d933c8cebef)
----
- plug-ins/common/file-cel.c | 283 +++++++++++++++++++++++++++++++++++++--------
- 1 file changed, 234 insertions(+), 49 deletions(-)
-
-diff --git a/plug-ins/common/file-cel.c b/plug-ins/common/file-cel.c
-index a94671c..3357561 100644
---- a/plug-ins/common/file-cel.c
-+++ b/plug-ins/common/file-cel.c
-@@ -44,8 +44,10 @@ static void run   (const gchar      *name,
-                    gint             *nreturn_vals,
-                    GimpParam       **return_vals);
- 
--static gint      load_palette   (FILE         *fp,
--                                 guchar        palette[]);
-+static gint      load_palette   (const gchar  *file,
-+                                 FILE         *fp,
-+                                 guchar        palette[],
-+                                 GError      **error);
- static gint32    load_image     (const gchar  *file,
-                                  const gchar  *brief,
-                                  GError      **error);
-@@ -55,7 +57,8 @@ static gboolean  save_image     (const gchar  *file,
-                                  gint32        layer,
-                                  GError      **error);
- static void      palette_dialog (const gchar  *title);
--static gboolean  need_palette   (const gchar  *file);
-+static gboolean  need_palette   (const gchar  *file,
-+                                 GError      **error);
- 
- 
- /* Globals... */
-@@ -150,6 +153,7 @@ run (const gchar      *name,
-   gint32             image;
-   GimpExportReturn   export = GIMP_EXPORT_CANCEL;
-   GError            *error  = NULL;
-+  gint               needs_palette = 0;
- 
-   run_mode = param[0].data.d_int32;
- 
-@@ -187,20 +191,32 @@ run (const gchar      *name,
-       else if (run_mode == GIMP_RUN_INTERACTIVE)
-         {
-           /* Let user choose KCF palette (cancel ignores) */
--          if (need_palette (param[1].data.d_string))
--            palette_dialog (_("Load KISS Palette"));
-+          needs_palette = need_palette (param[1].data.d_string, &error);
- 
--          gimp_set_data (SAVE_PROC, palette_file, data_length);
--        }
-+          if (! error)
-+            {
-+              if (needs_palette)
-+                palette_dialog (_("Load KISS Palette"));
- 
--      image = load_image (param[1].data.d_string, param[2].data.d_string,
--                          &error);
-+              gimp_set_data (SAVE_PROC, palette_file, data_length);
-+            }
-+        }
- 
--      if (image != -1)
-+      if (! error)
-         {
--          *nreturn_vals = 2;
--          values[1].type         = GIMP_PDB_IMAGE;
--          values[1].data.d_image = image;
-+          image = load_image (param[1].data.d_string, param[2].data.d_string,
-+                              &error);
-+
-+          if (image != -1)
-+            {
-+              *nreturn_vals = 2;
-+              values[1].type         = GIMP_PDB_IMAGE;
-+              values[1].data.d_image = image;
-+            }
-+          else
-+            {
-+              status = GIMP_PDB_EXECUTION_ERROR;
-+            }
-         }
-       else
-         {
-@@ -263,18 +279,33 @@ run (const gchar      *name,
- 
- /* Peek into the file to determine whether we need a palette */
- static gboolean
--need_palette (const gchar *file)
-+need_palette (const gchar *file,
-+              GError     **error)
- {
-   FILE   *fp;
-   guchar  header[32];
-+  size_t  n_read;
- 
-   fp = g_fopen (file, "rb");
--  if (!fp)
--    return FALSE;
-+  if (fp == NULL)
-+    {
-+      g_set_error (error, G_FILE_ERROR, g_file_error_from_errno (errno),
-+                   _("Could not open '%s' for reading: %s"),
-+                   gimp_filename_to_utf8 (file), g_strerror (errno));
-+      return FALSE;
-+    }
-+
-+  n_read = fread (header, 32, 1, fp);
- 
--  fread (header, 32, 1, fp);
-   fclose (fp);
- 
-+  if (n_read < 1)
-+    {
-+      g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                   _("EOF or error while reading image header"));
-+      return FALSE;
-+    }
-+
-   return (header[5] < 32);
- }
- 
-@@ -286,11 +317,12 @@ load_image (const gchar  *file,
-             GError      **error)
- {
-   FILE      *fp;            /* Read file pointer */
--  guchar     header[32];    /* File header */
-+  guchar     header[32],    /* File header */
-+             file_mark,     /* KiSS file type */
-+             bpp;           /* Bits per pixel */
-   gint       height, width, /* Dimensions of image */
-              offx, offy,    /* Layer offets */
--             colours,       /* Number of colours */
--             bpp;           /* Bits per pixel */
-+             colours;       /* Number of colours */
- 
-   gint32     image,         /* Image */
-              layer;         /* Layer */
-@@ -301,6 +333,7 @@ load_image (const gchar  *file,
-   GimpPixelRgn  pixel_rgn;  /* Pixel region for layer */
- 
-   gint       i, j, k;       /* Counters */
-+  size_t     n_read;        /* Number of items read from file */
- 
- 
-   /* Open the file for reading */
-@@ -319,7 +352,14 @@ load_image (const gchar  *file,
- 
-   /* Get the image dimensions and create the image... */
- 
--  fread (header, 4, 1, fp);
-+  n_read = fread (header, 4, 1, fp);
-+
-+  if (n_read < 1)
-+    {
-+      g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                   _("EOF or error while reading image header"));
-+      return -1;
-+    }
- 
-   if (strncmp ((const gchar *) header, "KiSS", 4))
-     {
-@@ -332,18 +372,53 @@ load_image (const gchar  *file,
-     }
-   else
-     { /* New-style image file, read full header */
--      fread (header, 28, 1, fp);
-+      n_read = fread (header, 28, 1, fp);
-+
-+      if (n_read < 1)
-+        {
-+          g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                       _("EOF or error while reading image header"));
-+          return -1;
-+        }
-+
-+      file_mark = header[0];
-+      if (file_mark != 0x20 && file_mark != 0x21)
-+        {
-+          g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                       _("is not a CEL image file"));
-+          return -1;
-+        }
-+
-       bpp = header[1];
--      if (bpp == 24)
--        colours = -1;
--      else
--        colours = (1 << header[1]);
-+      switch (bpp)
-+        {
-+        case 4:
-+        case 8:
-+        case 32:
-+          colours = (1 << bpp);
-+          break;
-+        default:
-+          g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                       _("illegal bpp value in image: %hhu"), bpp);
-+          return -1;
-+        }
-+
-       width = header[4] + (256 * header[5]);
-       height = header[6] + (256 * header[7]);
-       offx = header[8] + (256 * header[9]);
-       offy = header[10] + (256 * header[11]);
-     }
- 
-+  if ((width == 0) || (height == 0) || (width + offx > GIMP_MAX_IMAGE_SIZE) ||
-+      (height + offy > GIMP_MAX_IMAGE_SIZE))
-+    {
-+      g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                   _("illegal image dimensions: width: %d, horizontal offset: "
-+                     "%d, height: %d, vertical offset: %d"),
-+                   width, offx, height, offy);
-+      return -1;
-+    }
-+
-   if (bpp == 32)
-     image = gimp_image_new (width + offx, height + offy, GIMP_RGB);
-   else
-@@ -351,7 +426,8 @@ load_image (const gchar  *file,
- 
-   if (image == -1)
-     {
--      g_message (_("Can't create a new image"));
-+      g_set_error (error, 0, 0, _("Can't create a new image"));
-+      fclose (fp);
-       return -1;
-     }
- 
-@@ -383,7 +459,15 @@ load_image (const gchar  *file,
-       switch (bpp)
-         {
-         case 4:
--          fread (buffer, (width+1)/2, 1, fp);
-+          n_read = fread (buffer, (width+1)/2, 1, fp);
-+
-+          if (n_read < 1)
-+            {
-+              g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                           _("EOF or error while reading image data"));
-+              return -1;
-+            }
-+
-           for (j = 0, k = 0; j < width*2; j+= 4, ++k)
-             {
-               if (buffer[k] / 16 == 0)
-@@ -410,7 +494,15 @@ load_image (const gchar  *file,
-           break;
- 
-         case 8:
--          fread (buffer, width, 1, fp);
-+          n_read = fread (buffer, width, 1, fp);
-+
-+          if (n_read < 1)
-+            {
-+              g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                           _("EOF or error while reading image data"));
-+              return -1;
-+            }
-+
-           for (j = 0, k = 0; j < width*2; j+= 2, ++k)
-             {
-               if (buffer[k] == 0)
-@@ -427,7 +519,15 @@ load_image (const gchar  *file,
-           break;
- 
-         case 32:
--          fread (line, width*4, 1, fp);
-+          n_read = fread (line, width*4, 1, fp);
-+
-+          if (n_read < 1)
-+            {
-+              g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                           _("EOF or error while reading image data"));
-+              return -1;
-+            }
-+
-           /* The CEL file order is BGR so we need to swap B and R
-            * to get the Gimp RGB order.
-            */
-@@ -440,7 +540,8 @@ load_image (const gchar  *file,
-           break;
- 
-         default:
--          g_message (_("Unsupported bit depth (%d)!"), bpp);
-+          g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                       _("Unsupported bit depth (%d)!"), bpp);
-           return -1;
-         }
- 
-@@ -457,7 +558,7 @@ load_image (const gchar  *file,
-   if (bpp != 32)
-     {
-       /* Use palette from file or otherwise default grey palette */
--      palette = g_new (guchar, colours*3);
-+      guchar palette[256*3];
- 
-       /* Open the file for reading if user picked one */
-       if (palette_file == NULL)
-@@ -467,12 +568,23 @@ load_image (const gchar  *file,
-       else
-         {
-           fp = g_fopen (palette_file, "r");
-+
-+          if (fp == NULL)
-+            {
-+              g_set_error (error, G_FILE_ERROR, g_file_error_from_errno (errno),
-+                           _("Could not open '%s' for reading: %s"),
-+                           gimp_filename_to_utf8 (palette_file),
-+                           g_strerror (errno));
-+              return -1;
-+            }
-         }
- 
-       if (fp != NULL)
-         {
--          colours = load_palette (fp, palette);
-+          colours = load_palette (palette_file, fp, palette, error);
-           fclose (fp);
-+          if (colours < 0 || *error)
-+            return -1;
-         }
-       else
-         {
-@@ -483,10 +595,6 @@ load_image (const gchar  *file,
-         }
- 
-       gimp_image_set_colormap (image, palette + 3, colours - 1);
--
--      /* Close palette file, give back allocated memory */
--
--      g_free (palette);
-     }
- 
-   /* Now get everything redrawn and hand back the finished image */
-@@ -498,32 +606,100 @@ load_image (const gchar  *file,
- }
- 
- static gint
--load_palette (FILE   *fp,
--              guchar  palette[])
-+load_palette (const gchar *file,
-+              FILE        *fp,
-+              guchar       palette[],
-+              GError     **error)
- {
-   guchar        header[32];     /* File header */
-   guchar        buffer[2];
--  int           i, bpp, colours= 0;
-+  guchar        file_mark, bpp;
-+  gint          i, colours = 0;
-+  size_t        n_read;
-+
-+  n_read = fread (header, 4, 1, fp);
-+
-+  if (n_read < 1)
-+    {
-+      g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                   _("'%s': EOF or error while reading palette header"),
-+                   gimp_filename_to_utf8 (file));
-+      return -1;
-+    }
- 
--  fread (header, 4, 1, fp);
-   if (!strncmp ((const gchar *) header, "KiSS", 4))
-     {
--      fread (header+4, 28, 1, fp);
-+      n_read = fread (header+4, 28, 1, fp);
-+
-+      if (n_read < 1)
-+        {
-+          g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                       _("'%s': EOF or error while reading palette header"),
-+                       gimp_filename_to_utf8 (file));
-+          return -1;
-+        }
-+
-+      file_mark = header[4];
-+      if (file_mark != 0x10)
-+        {
-+          g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                       _("'%s': is not a KCF palette file"),
-+                       gimp_filename_to_utf8 (file));
-+          return -1;
-+        }
-+
-       bpp = header[5];
-+      if (bpp != 12 && bpp != 24)
-+        {
-+          g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                       _("'%s': illegal bpp value in palette: %hhu"),
-+                       gimp_filename_to_utf8 (file), bpp);
-+          return -1;
-+        }
-+
-       colours = header[8] + header[9] * 256;
--      if (bpp == 12)
-+      if (colours != 16 && colours != 256)
-+        {
-+          g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                       _("'%s': illegal number of colors: %u"),
-+                       gimp_filename_to_utf8 (file), colours);
-+          return -1;
-+        }
-+
-+      switch (bpp)
-         {
-+        case 12:
-           for (i = 0; i < colours; ++i)
-             {
--              fread (buffer, 1, 2, fp);
-+              n_read = fread (buffer, 1, 2, fp);
-+
-+              if (n_read < 2)
-+                {
-+                  g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                               _("'%s': EOF or error while reading "
-+                                 "palette data"),
-+                               gimp_filename_to_utf8 (file));
-+                  return -1;
-+                }
-+
-               palette[i*3]= buffer[0] & 0xf0;
-               palette[i*3+1]= (buffer[1] & 0x0f) * 16;
-               palette[i*3+2]= (buffer[0] & 0x0f) * 16;
-             }
--        }
--      else
--        {
--          fread (palette, colours, 3, fp);
-+          break;
-+        case 24:
-+          n_read = fread (palette, colours, 3, fp);
-+
-+          if (n_read < 3)
-+            {
-+              g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                           _("'%s': EOF or error while reading palette data"),
-+                           gimp_filename_to_utf8 (file));
-+              return -1;
-+            }
-+          break;
-+        default:
-+          g_assert_not_reached ();
-         }
-     }
-   else
-@@ -532,7 +708,16 @@ load_palette (FILE   *fp,
-       fseek (fp, 0, SEEK_SET);
-       for (i= 0; i < colours; ++i)
-         {
--          fread (buffer, 1, 2, fp);
-+          n_read = fread (buffer, 1, 2, fp);
-+
-+          if (n_read < 2)
-+            {
-+              g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-+                           _("'%s': EOF or error while reading palette data"),
-+                           gimp_filename_to_utf8 (file));
-+              return -1;
-+            }
-+
-           palette[i*3] = buffer[0] & 0xf0;
-           palette[i*3+1] = (buffer[1] & 0x0f) * 16;
-           palette[i*3+2] = (buffer[0] & 0x0f) * 16;
--- 
-1.7.11.4
-

diff --git a/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3481.patch b/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3481.patch
deleted file mode 100644
index a5aee6a..00000000
--- a/media-gfx/gimp/files/gimp-2.6.12-CVE-2012-3481.patch
+++ /dev/null
@@ -1,56 +0,0 @@
-From 26b208c5aef5f7801bf0538f8df549f0bf8dcb92 Mon Sep 17 00:00:00 2001
-From: Nils Philippsen <nils@redhat.com>
-Date: Mon, 20 Aug 2012 15:30:33 +0200
-Subject: [PATCH] patch: CVE-2012-3481
-
-Squashed commit of the following:
-
-commit c56f3dc25cd4941f465e88bd91a0e107a4ac1b5e
-Author: Nils Philippsen <nils@redhat.com>
-Date:   Tue Aug 14 15:27:39 2012 +0200
-
-    file-gif-load: fix type overflow (CVE-2012-3481)
-
-    Cast variables properly to avoid overflowing when computing how much
-    memory to allocate.
-    (cherry picked from commit 43fc9dbd8e2196944c8a71321e525b89b7df9f5c)
-
-commit 11e922a8cee5c9bb532e2a996d2db3beab6da6cb
-Author: Jan Lieskovsky <jlieskov@redhat.com>
-Date:   Tue Aug 14 12:18:22 2012 +0200
-
-    file-gif-load: limit len and height (CVE-2012-3481)
-
-    Ensure values of len and height can't overflow g_malloc() argument type.
-    (cherry picked from commit d95c2f0bcb6775bdee2bef35b7d84f6dfd490783)
----
- plug-ins/common/file-gif-load.c | 11 +++++++++--
- 1 file changed, 9 insertions(+), 2 deletions(-)
-
-diff --git a/plug-ins/common/file-gif-load.c b/plug-ins/common/file-gif-load.c
-index 8460ec0..295c351 100644
---- a/plug-ins/common/file-gif-load.c
-+++ b/plug-ins/common/file-gif-load.c
-@@ -1028,10 +1028,17 @@ ReadImage (FILE        *fd,
-   cur_progress = 0;
-   max_progress = height;
- 
-+  if (len > (G_MAXSIZE / height / (alpha_frame ? (promote_to_rgb ? 4 : 2) : 1)))
-+  {
-+    g_message ("'%s' has a larger image size than GIMP can handle.",
-+               gimp_filename_to_utf8 (filename));
-+    return -1;
-+  }
-+
-   if (alpha_frame)
--    dest = (guchar *) g_malloc (len * height * (promote_to_rgb ? 4 : 2));
-+    dest = (guchar *) g_malloc ((gsize)len * (gsize)height * (promote_to_rgb ? 4 : 2));
-   else
--    dest = (guchar *) g_malloc (len * height);
-+    dest = (guchar *) g_malloc ((gsize)len * (gsize)height);
- 
- #ifdef GIFDEBUG
-     g_print ("GIF: reading %d by %d%s GIF image, ncols=%d\n",
--- 
-1.7.11.4
-

diff --git a/media-gfx/gimp/files/gimp-2.6.12-potfiles-skip.patch b/media-gfx/gimp/files/gimp-2.6.12-potfiles-skip.patch
deleted file mode 100644
index ee1b89a..00000000
--- a/media-gfx/gimp/files/gimp-2.6.12-potfiles-skip.patch
+++ /dev/null
@@ -1,17 +0,0 @@
-From: Julian Ospald <julian.ospald@googlemail.com>
-Date: Fri Mar  2 17:29:14 CET 2012
-
-gimp-2.6.11 fails on FEATURES="test"
-correctly add "contactsheet.scm" and "test-sphere.scm" to POTFILES.skip
-
---- po-script-fu/POTFILES.skip
-+++ po-script-fu/POTFILES.skip
-@@ -37,6 +37,8 @@
- plug-ins/pagecurl
- plug-ins/print
- plug-ins/pygimp
-+plug-ins/script-fu/scripts/contactsheet.scm
-+plug-ins/script-fu/scripts/test-sphere.scm
- plug-ins/selection-to-path
- plug-ins/twain
- plug-ins/win-snap

diff --git a/media-gfx/gimp/files/gimp-2.8.10-CVE-2013-1913.patch b/media-gfx/gimp/files/gimp-2.8.10-CVE-2013-1913.patch
deleted file mode 100644
index e257c69..00000000
--- a/media-gfx/gimp/files/gimp-2.8.10-CVE-2013-1913.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-From 32ae0f83e5748299641cceaabe3f80f1b3afd03e Mon Sep 17 00:00:00 2001
-From: Nils Philippsen <nils@redhat.com>
-Date: Thu, 14 Nov 2013 14:29:01 +0100
-Subject: file-xwd: sanity check colormap size (CVE-2013-1913)
-
-
-diff --git a/plug-ins/common/file-xwd.c b/plug-ins/common/file-xwd.c
-index c8e1a6e..343129a 100644
---- a/plug-ins/common/file-xwd.c
-+++ b/plug-ins/common/file-xwd.c
-@@ -466,6 +466,17 @@ load_image (const gchar  *filename,
-   /* Position to start of XWDColor structures */
-   fseek (ifp, (long)xwdhdr.l_header_size, SEEK_SET);
- 
-+  /* Guard against insanely huge color maps -- gimp_image_set_colormap() only
-+   * accepts colormaps with 0..256 colors anyway. */
-+  if (xwdhdr.l_colormap_entries > 256)
-+    {
-+      g_message (_("'%s':\nIllegal number of colormap entries: %ld"),
-+                 gimp_filename_to_utf8 (filename),
-+                 (long)xwdhdr.l_colormap_entries);
-+      fclose (ifp);
-+      return -1;
-+    }
-+
-   if (xwdhdr.l_colormap_entries > 0)
-     {
-       xwdcolmap = g_new (L_XWDCOLOR, xwdhdr.l_colormap_entries);
--- 
-cgit v0.10.1
-

diff --git a/media-gfx/gimp/files/gimp-2.8.10-CVE-2013-1978.patch b/media-gfx/gimp/files/gimp-2.8.10-CVE-2013-1978.patch
deleted file mode 100644
index 43b4bcb..00000000
--- a/media-gfx/gimp/files/gimp-2.8.10-CVE-2013-1978.patch
+++ /dev/null
@@ -1,151 +0,0 @@
-From 23f685931e5f000dd033a45c60c1e60d7f78caf4 Mon Sep 17 00:00:00 2001
-From: Nils Philippsen <nils@redhat.com>
-Date: Tue, 26 Nov 2013 10:49:42 +0100
-Subject: file-xwd: sanity check # of colors and map entries (CVE-2013-1978)
-
-The number of colors in an image shouldn't be higher than the number of
-colormap entries. Additionally, consolidate post error cleanup in
-load_image().
-
-diff --git a/plug-ins/common/file-xwd.c b/plug-ins/common/file-xwd.c
-index 343129a..4df9ce8 100644
---- a/plug-ins/common/file-xwd.c
-+++ b/plug-ins/common/file-xwd.c
-@@ -429,9 +429,9 @@ static gint32
- load_image (const gchar  *filename,
-             GError      **error)
- {
--  FILE            *ifp;
-+  FILE            *ifp = NULL;
-   gint             depth, bpp;
--  gint32           image_ID;
-+  gint32           image_ID = -1;
-   L_XWDFILEHEADER  xwdhdr;
-   L_XWDCOLOR      *xwdcolmap = NULL;
- 
-@@ -441,7 +441,7 @@ load_image (const gchar  *filename,
-       g_set_error (error, G_FILE_ERROR, g_file_error_from_errno (errno),
-                    _("Could not open '%s' for reading: %s"),
-                    gimp_filename_to_utf8 (filename), g_strerror (errno));
--      return -1;
-+      goto out;
-     }
- 
-   read_xwd_header (ifp, &xwdhdr);
-@@ -450,8 +450,7 @@ load_image (const gchar  *filename,
-       g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-                    _("Could not read XWD header from '%s'"),
-                    gimp_filename_to_utf8 (filename));
--      fclose (ifp);
--      return -1;
-+      goto out;
-     }
- 
- #ifdef XWD_COL_WAIT_DEBUG
-@@ -473,12 +472,18 @@ load_image (const gchar  *filename,
-       g_message (_("'%s':\nIllegal number of colormap entries: %ld"),
-                  gimp_filename_to_utf8 (filename),
-                  (long)xwdhdr.l_colormap_entries);
--      fclose (ifp);
--      return -1;
-+      goto out;
-     }
- 
-   if (xwdhdr.l_colormap_entries > 0)
-     {
-+      if (xwdhdr.l_colormap_entries < xwdhdr.l_ncolors)
-+        {
-+          g_message (_("'%s':\nNumber of colormap entries < number of colors"),
-+                     gimp_filename_to_utf8 (filename));
-+          goto out;
-+        }
-+
-       xwdcolmap = g_new (L_XWDCOLOR, xwdhdr.l_colormap_entries);
- 
-       read_xwd_cols (ifp, &xwdhdr, xwdcolmap);
-@@ -498,9 +503,7 @@ load_image (const gchar  *filename,
-       if (xwdhdr.l_file_version != 7)
-         {
-           g_message (_("Can't read color entries"));
--          g_free (xwdcolmap);
--          fclose (ifp);
--          return (-1);
-+          goto out;
-         }
-     }
- 
-@@ -508,9 +511,7 @@ load_image (const gchar  *filename,
-     {
-       g_message (_("'%s':\nNo image width specified"),
-                  gimp_filename_to_utf8 (filename));
--      g_free (xwdcolmap);
--      fclose (ifp);
--      return (-1);
-+      goto out;
-     }
- 
-   if (xwdhdr.l_pixmap_width > GIMP_MAX_IMAGE_SIZE
-@@ -518,27 +519,21 @@ load_image (const gchar  *filename,
-     {
-       g_message (_("'%s':\nImage width is larger than GIMP can handle"),
-                  gimp_filename_to_utf8 (filename));
--      g_free (xwdcolmap);
--      fclose (ifp);
--      return (-1);
-+      goto out;
-     }
- 
-   if (xwdhdr.l_pixmap_height <= 0)
-     {
-       g_message (_("'%s':\nNo image height specified"),
-                  gimp_filename_to_utf8 (filename));
--      g_free (xwdcolmap);
--      fclose (ifp);
--      return (-1);
-+      goto out;
-     }
- 
-   if (xwdhdr.l_pixmap_height > GIMP_MAX_IMAGE_SIZE)
-     {
-       g_message (_("'%s':\nImage height is larger than GIMP can handle"),
-                  gimp_filename_to_utf8 (filename));
--      g_free (xwdcolmap);
--      fclose (ifp);
--      return (-1);
-+      goto out;
-     }
- 
-   gimp_progress_init_printf (_("Opening '%s'"),
-@@ -591,11 +586,6 @@ load_image (const gchar  *filename,
-     }
-   gimp_progress_update (1.0);
- 
--  fclose (ifp);
--
--  if (xwdcolmap)
--    g_free (xwdcolmap);
--
-   if (image_ID == -1 && ! (error && *error))
-     g_set_error (error, G_FILE_ERROR, G_FILE_ERROR_FAILED,
-                  _("XWD-file %s has format %d, depth %d and bits per pixel %d. "
-@@ -603,6 +593,17 @@ load_image (const gchar  *filename,
-                  gimp_filename_to_utf8 (filename),
-                  (gint) xwdhdr.l_pixmap_format, depth, bpp);
- 
-+out:
-+  if (ifp)
-+    {
-+      fclose (ifp);
-+    }
-+
-+  if (xwdcolmap)
-+    {
-+      g_free (xwdcolmap);
-+    }
-+
-   return image_ID;
- }
- 
--- 
-cgit v0.10.1
-

diff --git a/media-gfx/gimp/files/gimp-2.8.10-freetype251.patch b/media-gfx/gimp/files/gimp-2.8.10-freetype251.patch
deleted file mode 100644
index c5c20d5..00000000
--- a/media-gfx/gimp/files/gimp-2.8.10-freetype251.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From 6c73f28b6d87a2afd11974552a075bffec52347f Mon Sep 17 00:00:00 2001
-From: Michael Natterer <mitch@gimp.org>
-Date: Fri, 29 Nov 2013 21:57:46 +0100
-Subject: Bug 719560 - Build failure with freetype 2.5.1
-
-Apply patch from su-v that fixes the freetype include to
-the madness devised and recommended by freetype.
-
-diff --git a/app/text/gimpfont.c b/app/text/gimpfont.c
-index 4045ca9..66c6e52 100644
---- a/app/text/gimpfont.c
-+++ b/app/text/gimpfont.c
-@@ -28,7 +28,9 @@
- 
- #define PANGO_ENABLE_ENGINE  1   /* Argh */
- #include <pango/pango-ot.h>
--#include <freetype/tttables.h>
-+
-+#include <ft2build.h>
-+#include FT_TRUETYPE_TABLES_H
- 
- #include "text-types.h"
- 
--- 
-cgit v0.10.1
-

diff --git a/media-gfx/gimp/files/gimp-curl-headers.diff b/media-gfx/gimp/files/gimp-curl-headers.diff
deleted file mode 100644
index ea8935d..00000000
--- a/media-gfx/gimp/files/gimp-curl-headers.diff
+++ /dev/null
@@ -1,12 +0,0 @@
-diff --git a/plug-ins/file-uri/uri-backend-libcurl.c b/plug-ins/file-uri/uri-backend-libcurl.c
-index a566966..747dca7 100644
---- a/plug-ins/file-uri/uri-backend-libcurl.c
-+++ b/plug-ins/file-uri/uri-backend-libcurl.c
-@@ -24,7 +24,6 @@
- #include <errno.h>
- 
- #include <curl/curl.h>
--#include <curl/types.h>
- #include <curl/easy.h>
- 
- #include <glib/gstdio.h>


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [gentoo-commits] repo/gentoo:master commit in: media-gfx/gimp/files/
@ 2017-10-25 23:02 Sebastian Pipping
  0 siblings, 0 replies; 3+ messages in thread
From: Sebastian Pipping @ 2017-10-25 23:02 UTC (permalink / raw
  To: gentoo-commits

commit:     5f22ead69f053210fc9106d5f76914e6e24bc069
Author:     Sebastian Pipping <sping <AT> gentoo <DOT> org>
AuthorDate: Wed Oct 25 23:02:04 2017 +0000
Commit:     Sebastian Pipping <sping <AT> gentoo <DOT> org>
CommitDate: Wed Oct 25 23:02:04 2017 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5f22ead6

media-gfx/gimp: Remove unused patches

Package-Manager: Portage-2.3.10, Repoman-2.3.3

 media-gfx/gimp/files/gimp-2.8.6-uclibc.patch       |  45 ----
 .../gimp/files/gimp-2.9.2-CVE-2016-4994.patch      |  88 -------
 media-gfx/gimp/files/gimp-2.9.2-gegl-0.3.8.patch   |  54 ----
 .../gimp/files/gimp-2.9.2-no-deprecation.patch     |  50 ----
 media-gfx/gimp/files/gimp-2.9.2-version.patch      |  28 --
 .../gimp/files/gimp-2.9.4-CVE-2007-3126.patch      | 291 ---------------------
 media-gfx/gimp/files/gimp-2.9.4-gegl-bin.patch     |  28 --
 .../gimp/files/gimp-2.9.4-mkdir-makefile.patch     |  36 ---
 8 files changed, 620 deletions(-)

diff --git a/media-gfx/gimp/files/gimp-2.8.6-uclibc.patch b/media-gfx/gimp/files/gimp-2.8.6-uclibc.patch
deleted file mode 100644
index 855e9872f4b..00000000000
--- a/media-gfx/gimp/files/gimp-2.8.6-uclibc.patch
+++ /dev/null
@@ -1,45 +0,0 @@
-From 4fb7a436bca3e11abfda8bc23818af0f09714b9d Mon Sep 17 00:00:00 2001
-From: Michael Natterer <mitch@gimp.org>
-Date: Fri, 02 Aug 2013 14:50:00 +0000
-Subject: Bug 704980 - uclibc - base-utils.c: execinfo.h: No such file or directory
-
-Apply patch from Amadeusz Slawinski that checks for execinfo.h and
-builds the code that needs it conditionally.
----
-diff --git a/app/base/base-utils.c b/app/base/base-utils.c
-index 757f58d..44a9e89 100644
---- a/app/base/base-utils.c
-+++ b/app/base/base-utils.c
-@@ -29,7 +29,7 @@
- #include <process.h>
- #endif
- 
--#ifdef G_OS_UNIX
-+#if defined(G_OS_UNIX) && defined(HAVE_EXECINFO_H)
- /* For get_backtrace() */
- #include <stdlib.h>
- #include <string.h>
-@@ -112,7 +112,7 @@ get_physical_memory_size (void)
- char *
- get_backtrace (void)
- {
--#ifdef G_OS_UNIX
-+#if defined(G_OS_UNIX) && defined(HAVE_EXECINFO_H)
-   void     *functions[MAX_FUNC];
-   char    **function_names;
-   int       n_functions;
-diff --git a/configure.ac b/configure.ac
-index 0bbcbc7..15c7cc6 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -416,7 +416,7 @@ AC_HEADER_STDC
- AC_HEADER_SYS_WAIT
- AC_HEADER_TIME
- 
--AC_CHECK_HEADERS(sys/param.h sys/time.h sys/times.h sys/wait.h unistd.h)
-+AC_CHECK_HEADERS(execinfo.h sys/param.h sys/time.h sys/times.h sys/wait.h unistd.h)
- 
- AC_TYPE_PID_T
- AC_FUNC_VPRINTF
---
-cgit v0.9.2

diff --git a/media-gfx/gimp/files/gimp-2.9.2-CVE-2016-4994.patch b/media-gfx/gimp/files/gimp-2.9.2-CVE-2016-4994.patch
deleted file mode 100644
index 846318b4214..00000000000
--- a/media-gfx/gimp/files/gimp-2.9.2-CVE-2016-4994.patch
+++ /dev/null
@@ -1,88 +0,0 @@
-From 6d804bf9ae77bc86a0a97f9b944a129844df9395 Mon Sep 17 00:00:00 2001
-From: Shmuel H <shmuelgimp@gmail.com>
-Date: Mon, 20 Jun 2016 17:14:41 +0300
-Subject: Bug 767873 - (CVE-2016-4994) Multiple Use-After-Free when parsing...
-
-...XCF channel and layer properties
-
-The properties PROP_ACTIVE_LAYER, PROP_FLOATING_SELECTION,
-PROP_ACTIVE_CHANNEL saves the current object pointer the @info
-structure. Others like PROP_SELECTION (for channel) and
-PROP_GROUP_ITEM (for layer) will delete the current object and create
-a new object, leaving the pointers in @info invalid (dangling).
-
-Therefore, if a property from the first type will come before the
-second, the result will be an UaF in the last lines of xcf_load_image
-(when it actually using the pointers from @info).
-
-I wasn't able to exploit this bug because that
-g_object_instance->c_class gets cleared by the last g_object_unref and
-GIMP_IS_{LAYER,CHANNEL} detects that and return FALSE.
----
- app/xcf/xcf-load.c | 29 +++++++++++++++++++++++++++++
- 1 file changed, 29 insertions(+)
-
-diff --git a/app/xcf/xcf-load.c b/app/xcf/xcf-load.c
-index f48558a..244d5c2 100644
---- a/app/xcf/xcf-load.c
-+++ b/app/xcf/xcf-load.c
-@@ -1141,6 +1141,18 @@ xcf_load_layer_props (XcfInfo    *info,
-         case PROP_GROUP_ITEM:
-           {
-             GimpLayer *group;
-+            gboolean   is_active_layer;
-+
-+            /* We're going to delete *layer, Don't leave its pointers
-+             * in @info.  After that, we'll restore them back with the
-+             * new pointer. See bug #767873.
-+             */
-+            is_active_layer = (*layer == info->active_layer);
-+            if (is_active_layer)
-+              info->active_layer = NULL;
-+
-+            if (*layer == info->floating_sel)
-+              info->floating_sel = NULL;
- 
-             group = gimp_group_layer_new (image);
- 
-@@ -1150,6 +1162,13 @@ xcf_load_layer_props (XcfInfo    *info,
-             g_object_ref_sink (*layer);
-             g_object_unref (*layer);
-             *layer = group;
-+
-+            if (is_active_layer)
-+              info->active_layer = *layer;
-+
-+            /* Don't restore info->floating_sel because group layers
-+             * can't be floating selections
-+             */
-           }
-           break;
- 
-@@ -1220,6 +1239,12 @@ xcf_load_channel_props (XcfInfo      *info,
-           {
-             GimpChannel *mask;
- 
-+            /* We're going to delete *channel, Don't leave its pointer
-+             * in @info. See bug #767873.
-+             */
-+            if (*channel == info->active_channel)
-+              info->active_channel = NULL;
-+
-             mask =
-               gimp_selection_new (image,
-                                   gimp_item_get_width  (GIMP_ITEM (*channel)),
-@@ -1234,6 +1259,10 @@ xcf_load_channel_props (XcfInfo      *info,
-             *channel = mask;
-             (*channel)->boundary_known = FALSE;
-             (*channel)->bounds_known   = FALSE;
-+
-+            /* Don't restore info->active_channel because the
-+             * selection can't be the active channel
-+             */
-           }
-           break;
- 
--- 
-cgit v0.12
-

diff --git a/media-gfx/gimp/files/gimp-2.9.2-gegl-0.3.8.patch b/media-gfx/gimp/files/gimp-2.9.2-gegl-0.3.8.patch
deleted file mode 100644
index a3aa236542b..00000000000
--- a/media-gfx/gimp/files/gimp-2.9.2-gegl-0.3.8.patch
+++ /dev/null
@@ -1,54 +0,0 @@
-https://bugs.gentoo.org/586828
-
-Backported from:
-https://git.gnome.org/browse/gimp/commit/?id=2e4685013123c584354bc38612527593a815c38b
-
---- gimp-2.9.2/app/core/gimpparamspecs-duplicate.c
-+++ gimp-2.9.2/app/core/gimpparamspecs-duplicate.c
-@@ -66,23 +66,11 @@
-         }
-       else
-         {
--
-           copy = g_param_spec_string (pspec->name,
-                                       g_param_spec_get_nick (pspec),
-                                       g_param_spec_get_blurb (pspec),
-                                       spec->default_value,
-                                       flags);
--
--          if (GEGL_IS_PARAM_SPEC_MULTILINE (pspec))
--            {
--              static GQuark multiline_quark = 0;
--
--              if (! multiline_quark)
--                multiline_quark = g_quark_from_static_string ("multiline");
--
--              g_param_spec_set_qdata (copy, multiline_quark,
--                                      GINT_TO_POINTER (TRUE));
--            }
-         }
-     }
-   else if (G_IS_PARAM_SPEC_BOOLEAN (pspec))
---- gimp-2.9.2/app/widgets/gimppropgui.c
-+++ gimp-2.9.2/app/widgets/gimppropgui.c
-@@ -227,11 +227,6 @@
-     }
-   else if (G_IS_PARAM_SPEC_STRING (pspec))
-     {
--      static GQuark multiline_quark = 0;
--
--      if (! multiline_quark)
--        multiline_quark = g_quark_from_static_string ("multiline");
--
-       if (GIMP_IS_PARAM_SPEC_CONFIG_PATH (pspec))
-         {
-           widget =
-@@ -239,7 +234,7 @@
-                                                g_param_spec_get_nick (pspec),
-                                                GTK_FILE_CHOOSER_ACTION_OPEN);
-         }
--      else if (g_param_spec_get_qdata (pspec, multiline_quark))
-+      else if (HAS_KEY (pspec, "multiline", "true"))
-         {
-           GtkTextBuffer *buffer;
-           GtkWidget     *view;

diff --git a/media-gfx/gimp/files/gimp-2.9.2-no-deprecation.patch b/media-gfx/gimp/files/gimp-2.9.2-no-deprecation.patch
deleted file mode 100644
index 441298a08fd..00000000000
--- a/media-gfx/gimp/files/gimp-2.9.2-no-deprecation.patch
+++ /dev/null
@@ -1,50 +0,0 @@
-From 81d7607e5159275a9b693a170f7767ffcb548a1b Mon Sep 17 00:00:00 2001
-From: Sebastian Pipping <sebastian@pipping.org>
-Date: Sat, 5 Dec 2015 01:14:37 +0100
-Subject: [PATCH] Do not disable deprecated APIs
-
----
- configure.ac | 27 ---------------------------
- 1 file changed, 27 deletions(-)
-
-diff --git a/configure.ac b/configure.ac
-index 4de6e53..8528e87 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -2111,33 +2111,6 @@ MIME_TYPES="$MIME_TYPES;"
- AC_SUBST(MIME_TYPES)
- 
- 
--#########################
--# Disable deprecated APIs
--#########################
--
--CPPFLAGS="${CPPFLAGS} -DGIMP_DISABLE_DEPRECATED -DBABL_DISABLE_DEPRECATED -DGSEAL_ENABLE"
--
--# Make sure not to disable deprecated APIs for unreleased versions.
--# We must build without problems with future releases of libraries
--# and disabling deprecated API risks breaking the build
--
--if test "x$have_glib_2_43" != "xyes"; then
--  CPPFLAGS="${CPPFLAGS} -DG_DISABLE_DEPRECATED"
--fi
--
--if test "x$have_gtk_2_26" != "xyes"; then
--  CPPFLAGS="${CPPFLAGS} -DGDK_DISABLE_DEPRECATED -DGTK_DISABLE_DEPRECATED"
--fi
--
--if test "x$have_gdk_pixbuf_2_31" != "xyes"; then
--  CPPFLAGS="${CPPFLAGS} -DGDK_PIXBUF_DISABLE_DEPRECATED"
--fi
--
--if test "x$have_pango_1_32" != "xyes"; then
--  CPPFLAGS="${CPPFLAGS} -DPANGO_DISABLE_DEPRECATED"
--fi
--
--
- ############################
- # Require multihead safe API
- ############################
--- 
-2.6.3
-

diff --git a/media-gfx/gimp/files/gimp-2.9.2-version.patch b/media-gfx/gimp/files/gimp-2.9.2-version.patch
deleted file mode 100644
index e4861445557..00000000000
--- a/media-gfx/gimp/files/gimp-2.9.2-version.patch
+++ /dev/null
@@ -1,28 +0,0 @@
-From f2f7a29ba5aceaa38a285f15c3fe8b481d05b357 Mon Sep 17 00:00:00 2001
-From: Sebastian Pipping <sebastian@pipping.org>
-Date: Sat, 5 Dec 2015 01:15:22 +0100
-Subject: [PATCH] Sync version string
-
-.. with
-m4_define([gimp_micro_version], [2])
-above
----
- configure.ac | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/configure.ac b/configure.ac
-index 8528e87..21d86a3 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -20,7 +20,7 @@ m4_define([gimp_binary_age],
-           [m4_eval(100 * gimp_minor_version + gimp_micro_version)])
- 
- # For overriding the version string. Comment out if not needed.
--# m4_define([gimp_version], [2.9.1])
-+# m4_define([gimp_version], [2.9.2])
- 
- # This is the X.Y used in -lgimp-X.Y
- m4_define([gimp_api_version], [2.0])
--- 
-2.6.3
-

diff --git a/media-gfx/gimp/files/gimp-2.9.4-CVE-2007-3126.patch b/media-gfx/gimp/files/gimp-2.9.4-CVE-2007-3126.patch
deleted file mode 100644
index 6c515173d9c..00000000000
--- a/media-gfx/gimp/files/gimp-2.9.4-CVE-2007-3126.patch
+++ /dev/null
@@ -1,291 +0,0 @@
-From 46bcd82800e37b0f5aead76184430ef2fe802748 Mon Sep 17 00:00:00 2001
-From: Michael Natterer <mitch@gimp.org>
-Date: Sun, 6 Nov 2016 21:34:43 +0100
-Subject: Bug 773233 - CVE-2007-3126 - Gimp 2.3.14 allows context-dependent
- attackers...
-
-...to cause a denial of service (crash) via an ICO file with an
-InfoHeader containing a Height of zero
-
-Add some error handling to ico-load.c and bail out on zero width or height
-icons. Also some formatting cleanup.
----
- plug-ins/file-ico/ico-load.c | 103 ++++++++++++++++++++++++++-----------------
- 1 file changed, 62 insertions(+), 41 deletions(-)
-
-diff --git a/plug-ins/file-ico/ico-load.c b/plug-ins/file-ico/ico-load.c
-index c8091d3..8cce94f 100644
---- a/plug-ins/file-ico/ico-load.c
-+++ b/plug-ins/file-ico/ico-load.c
-@@ -124,15 +124,17 @@ static guint32
- ico_read_init (FILE *fp)
- {
-   IcoFileHeader header;
-+
-   /* read and check file header */
--  if (!ico_read_int16 (fp, &header.reserved, 1)
--      || !ico_read_int16 (fp, &header.resource_type, 1)
--      || !ico_read_int16 (fp, &header.icon_count, 1)
--      || header.reserved != 0
--      || header.resource_type != 1)
-+  if (! ico_read_int16 (fp, &header.reserved, 1)      ||
-+      ! ico_read_int16 (fp, &header.resource_type, 1) ||
-+      ! ico_read_int16 (fp, &header.icon_count, 1)    ||
-+      header.reserved != 0 ||
-+      header.resource_type != 1)
-     {
-       return 0;
-     }
-+
-   return header.icon_count;
- }
- 
-@@ -148,22 +150,25 @@ ico_read_size (FILE        *fp,
-   gint32      color_type;
-   guint32     magic;
- 
--  if ( fseek (fp, info->offset, SEEK_SET) < 0 )
-+  if (fseek (fp, info->offset, SEEK_SET) < 0)
-     return FALSE;
- 
-   ico_read_int32 (fp, &magic, 1);
-+
-   if (magic == ICO_PNG_MAGIC)
-     {
-       png_ptr = png_create_read_struct (PNG_LIBPNG_VER_STRING, NULL, NULL,
-                                         NULL);
--      if (! png_ptr )
-+      if (! png_ptr)
-         return FALSE;
-+
-       info_ptr = png_create_info_struct (png_ptr);
--      if (! info_ptr )
-+      if (! info_ptr)
-         {
-           png_destroy_read_struct (&png_ptr, NULL, NULL);
-           return FALSE;
-         }
-+
-       if (setjmp (png_jmpbuf (png_ptr)))
-         {
-           png_destroy_read_struct (&png_ptr, NULL, NULL);
-@@ -182,8 +187,8 @@ ico_read_size (FILE        *fp,
-     }
-   else if (magic == 40)
-     {
--      if (ico_read_int32 (fp, &info->width, 1)
--          && ico_read_int32 (fp, &info->height, 1))
-+      if (ico_read_int32 (fp, &info->width, 1) &&
-+          ico_read_int32 (fp, &info->height, 1))
-         {
-           info->height /= 2;
-           D(("ico_read_size: ICO: %ix%i\n", info->width, info->height));
-@@ -200,8 +205,9 @@ ico_read_size (FILE        *fp,
- }
- 
- static IcoLoadInfo*
--ico_read_info (FILE *fp,
--               gint  icon_count)
-+ico_read_info (FILE    *fp,
-+               gint     icon_count,
-+               GError **error)
- {
-   gint            i;
-   IcoFileEntry   *entries;
-@@ -209,8 +215,11 @@ ico_read_info (FILE *fp,
- 
-   /* read icon entries */
-   entries = g_new (IcoFileEntry, icon_count);
--  if ( fread (entries, sizeof(IcoFileEntry), icon_count, fp) <= 0 )
-+  if (fread (entries, sizeof (IcoFileEntry), icon_count, fp) <= 0)
-     {
-+      g_set_error (error, G_FILE_ERROR, 0,
-+                   _("Could not read '%lu' bytes"),
-+                   sizeof (IcoFileEntry));
-       g_free (entries);
-       return NULL;
-     }
-@@ -218,23 +227,33 @@ ico_read_info (FILE *fp,
-   info = g_new (IcoLoadInfo, icon_count);
-   for (i = 0; i < icon_count; i++)
-     {
--      info[i].width = entries[i].width;
-+      info[i].width  = entries[i].width;
-       info[i].height = entries[i].height;
--      info[i].bpp = GUINT16_FROM_LE (entries[i].bpp);
--      info[i].size = GUINT32_FROM_LE (entries[i].size);
-+      info[i].bpp    = GUINT16_FROM_LE (entries[i].bpp);
-+      info[i].size   = GUINT32_FROM_LE (entries[i].size);
-       info[i].offset = GUINT32_FROM_LE (entries[i].offset);
- 
-       if (info[i].width == 0 || info[i].height == 0)
-         {
--          ico_read_size (fp, info+i);
-+          ico_read_size (fp, info + i);
-         }
- 
-       D(("ico_read_info: %ix%i (%i bits, size: %i, offset: %i)\n",
-          info[i].width, info[i].height, info[i].bpp,
-          info[i].size, info[i].offset));
-+
-+      if (info[i].width == 0 || info[i].height == 0)
-+        {
-+          g_set_error (error, G_FILE_ERROR, 0,
-+                       _("Icon #%d has zero width or height"), i);
-+          g_free (info);
-+          g_free (entries);
-+          return NULL;
-+        }
-     }
- 
-   g_free (entries);
-+
-   return info;
- }
- 
-@@ -256,10 +275,10 @@ ico_read_png (FILE    *fp,
-   gint          i;
- 
-   png_ptr = png_create_read_struct (PNG_LIBPNG_VER_STRING, NULL, NULL, NULL);
--  if (! png_ptr )
-+  if (! png_ptr)
-     return FALSE;
-   info = png_create_info_struct (png_ptr);
--  if (! info )
-+  if (! info)
-     {
-       png_destroy_read_struct (&png_ptr, NULL, NULL);
-       return FALSE;
-@@ -287,14 +306,14 @@ ico_read_png (FILE    *fp,
-     {
-     case PNG_COLOR_TYPE_GRAY:
-       png_set_expand_gray_1_2_4_to_8 (png_ptr);
--      if ( bit_depth == 16 )
-+      if (bit_depth == 16)
-         png_set_strip_16 (png_ptr);
-       png_set_gray_to_rgb (png_ptr);
-       png_set_add_alpha (png_ptr, 0xff, PNG_FILLER_AFTER);
-       break;
-     case PNG_COLOR_TYPE_GRAY_ALPHA:
-       png_set_expand_gray_1_2_4_to_8 (png_ptr);
--      if ( bit_depth == 16 )
-+      if (bit_depth == 16)
-         png_set_strip_16 (png_ptr);
-       png_set_gray_to_rgb (png_ptr);
-       break;
-@@ -427,16 +446,18 @@ ico_read_icon (FILE    *fp,
-      data.planes, data.image_size, data.bpp,
-      data.used_clrs, data.important_clrs));
- 
--  if (data.planes != 1
--      || data.compression != 0)
-+  if (data.planes      != 1 ||
-+      data.compression != 0)
-     {
-       D(("skipping image: invalid header\n"));
-       return FALSE;
-     }
- 
--  if (data.bpp != 1 && data.bpp != 4
--      && data.bpp != 8 && data.bpp != 24
--      && data.bpp != 32)
-+  if (data.bpp != 1  &&
-+      data.bpp != 4  &&
-+      data.bpp != 8  &&
-+      data.bpp != 24 &&
-+      data.bpp != 32)
-     {
-       D(("skipping image: invalid depth: %i\n", data.bpp));
-       return FALSE;
-@@ -590,8 +611,8 @@ ico_load_layer (FILE        *fp,
-   GeglBuffer *buffer;
-   gchar       name[ICO_MAXBUF];
- 
--  if ( fseek (fp, info->offset, SEEK_SET) < 0
--       || !ico_read_int32 (fp, &first_bytes, 1) )
-+  if (fseek (fp, info->offset, SEEK_SET) < 0 ||
-+      ! ico_read_int32 (fp, &first_bytes, 1))
-     return -1;
- 
-   if (first_bytes == ICO_PNG_MAGIC)
-@@ -643,7 +664,7 @@ ico_load_image (const gchar  *filename,
-                              gimp_filename_to_utf8 (filename));
- 
-   fp = g_fopen (filename, "rb");
--  if (! fp )
-+  if (! fp)
-     {
-       g_set_error (error, G_FILE_ERROR, g_file_error_from_errno (errno),
-                    _("Could not open '%s' for reading: %s"),
-@@ -658,8 +679,8 @@ ico_load_image (const gchar  *filename,
-       return -1;
-     }
- 
--  info = ico_read_info (fp, icon_count);
--  if (!info)
-+  info = ico_read_info (fp, icon_count, error);
-+  if (! info)
-     {
-       fclose (fp);
-       return -1;
-@@ -670,12 +691,12 @@ ico_load_image (const gchar  *filename,
-   max_height = 0;
-   for (i = 0; i < icon_count; i++)
-     {
--      if ( info[i].width > max_width )
-+      if (info[i].width > max_width)
-         max_width = info[i].width;
--      if ( info[i].height > max_height )
-+      if (info[i].height > max_height)
-         max_height = info[i].height;
-     }
--  if ( max_width <= 0 || max_height <= 0 )
-+  if (max_width <= 0 || max_height <= 0)
-     {
-       g_free (info);
-       fclose (fp);
-@@ -721,7 +742,7 @@ ico_load_thumbnail_image (const gchar  *filename,
-                              gimp_filename_to_utf8 (filename));
- 
-   fp = g_fopen (filename, "rb");
--  if (! fp )
-+  if (! fp)
-     {
-       g_set_error (error, G_FILE_ERROR, g_file_error_from_errno (errno),
-                    _("Could not open '%s' for reading: %s"),
-@@ -730,7 +751,7 @@ ico_load_thumbnail_image (const gchar  *filename,
-     }
- 
-   icon_count = ico_read_init (fp);
--  if (! icon_count )
-+  if (! icon_count)
-     {
-       fclose (fp);
-       return -1;
-@@ -739,8 +760,8 @@ ico_load_thumbnail_image (const gchar  *filename,
-   D(("*** %s: Microsoft icon file, containing %i icon(s)\n",
-      filename, icon_count));
- 
--  info = ico_read_info (fp, icon_count);
--  if (! info )
-+  info = ico_read_info (fp, icon_count, error);
-+  if (! info)
-     {
-       fclose (fp);
-       return -1;
-@@ -758,9 +779,9 @@ ico_load_thumbnail_image (const gchar  *filename,
- 
-           match = i;
-         }
--      else if ( w == info[i].width
--                && h == info[i].height
--                && info[i].bpp > bpp )
-+      else if (w == info[i].width  &&
-+               h == info[i].height &&
-+               info[i].bpp > bpp)
-         {
-           /* better quality */
-           bpp = info[i].bpp;
--- 
-cgit v0.12
-

diff --git a/media-gfx/gimp/files/gimp-2.9.4-gegl-bin.patch b/media-gfx/gimp/files/gimp-2.9.4-gegl-bin.patch
deleted file mode 100644
index 31057b5796d..00000000000
--- a/media-gfx/gimp/files/gimp-2.9.4-gegl-bin.patch
+++ /dev/null
@@ -1,28 +0,0 @@
-From 8d5de5ce62cd0410c9bccaa77725d0cad051faad Mon Sep 17 00:00:00 2001
-From: Sebastian Pipping <sebastian@pipping.org>
-Date: Mon, 18 Jul 2016 17:42:45 +0200
-Subject: [PATCH] Fix gegl executable name to check for
-
----
- configure.ac | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/configure.ac b/configure.ac
-index 45b31b1..0e5be99 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -674,9 +674,9 @@ else
- fi
- AC_MSG_RESULT($have_glib_2_43)
- 
--AC_PATH_PROG(GEGL, gegl, no)
-+AC_PATH_PROG(GEGL, gegl-0.3, no)
- if test "x$GEGL" = xno; then
--  add_deps_error([gegl], [Could not find gegl in your PATH.])
-+  add_deps_error([gegl], [Could not find gegl-0.3 in your PATH.])
- fi
- 
- 
--- 
-2.9.2
-

diff --git a/media-gfx/gimp/files/gimp-2.9.4-mkdir-makefile.patch b/media-gfx/gimp/files/gimp-2.9.4-mkdir-makefile.patch
deleted file mode 100644
index 661ad699f5d..00000000000
--- a/media-gfx/gimp/files/gimp-2.9.4-mkdir-makefile.patch
+++ /dev/null
@@ -1,36 +0,0 @@
-From c081a26345ad1c5bdf6f4ffec27bca517de6d594 Mon Sep 17 00:00:00 2001
-From: Sebastian Pipping <sebastian@pipping.org>
-Date: Sat, 23 Jul 2016 01:02:10 +0200
-Subject: [PATCH] Fix creation of output directories
-
-https://bugs.gentoo.org/show_bug.cgi?id=589394
----
- icons/Symbolic-Inverted/Makefile.am | 8 ++++----
- 1 file changed, 4 insertions(+), 4 deletions(-)
-
-diff --git a/icons/Symbolic-Inverted/Makefile.am b/icons/Symbolic-Inverted/Makefile.am
-index 2981cfc..f3fe6a5 100644
---- a/icons/Symbolic-Inverted/Makefile.am
-+++ b/icons/Symbolic-Inverted/Makefile.am
-@@ -10,14 +10,14 @@ include $(top_srcdir)/icons/icon-list.mk
- # As exceptions, we do not want to invert some icons.
- # Just use these as-is: gimp-default-colors, gimp-toilet-paper.png.
- 12/gimp-default-colors.png: $(top_srcdir)/icons/Symbolic/12/gimp-default-colors.png
--	mkdir -p `dirname $<` && cp -f $< $@
-+	mkdir -p `dirname $@` && cp -f $< $@
- scalable/gimp-default-colors.svg: ../Symbolic/scalable/gimp-default-colors.svg
--	mkdir -p `dirname $<` && cp -f $< $@
-+	mkdir -p `dirname $@` && cp -f $< $@
- 
- %/gimp-toilet-paper.png: $(top_srcdir)/icons/Symbolic/$(@D)/gimp-toilet-paper.png
--	mkdir -p `dirname $<` && cp -f $< $@
-+	mkdir -p `dirname $@` && cp -f $< $@
- scalable/gimp-toilet-paper.svg: ../Symbolic/scalable/gimp-toilet-paper.svg
--	mkdir -p `dirname $<` && cp -f $< $@
-+	mkdir -p `dirname $@` && cp -f $< $@
- 
- # Other exceptions: inverted gimp-color-picker-white|black are generated
- # from each other.
--- 
-2.9.2
-


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [gentoo-commits] repo/gentoo:master commit in: media-gfx/gimp/files/
@ 2018-01-06 16:42 Sebastian Pipping
  0 siblings, 0 replies; 3+ messages in thread
From: Sebastian Pipping @ 2018-01-06 16:42 UTC (permalink / raw
  To: gentoo-commits

commit:     8674a045a9220e0c07e6f9e6017b5f3c5b00d25f
Author:     Michael Mair-Keimberger <m.mairkeimberger <AT> gmail <DOT> com>
AuthorDate: Sat Jan  6 09:12:49 2018 +0000
Commit:     Sebastian Pipping <sping <AT> gentoo <DOT> org>
CommitDate: Sat Jan  6 16:42:15 2018 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=8674a045

media-gfx/gimp: remove unused patch

 media-gfx/gimp/files/gimp-2.9.6-underlinking.patch | 20 --------------------
 1 file changed, 20 deletions(-)

diff --git a/media-gfx/gimp/files/gimp-2.9.6-underlinking.patch b/media-gfx/gimp/files/gimp-2.9.6-underlinking.patch
deleted file mode 100644
index 9208c2f329b..00000000000
--- a/media-gfx/gimp/files/gimp-2.9.6-underlinking.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-diff --git a/libgimpbase/Makefile.am b/libgimpbase/Makefile.am
-index a1a6719..85c8518 100644
---- a/libgimpbase/Makefile.am
-+++ b/libgimpbase/Makefile.am
-@@ -22,6 +22,7 @@ uninstall-libtool-import-lib:
- 	-rm $(DESTDIR)$(libdir)/libgimpbase-$(GIMP_API_VERSION).dll.a
- 	-rm $(DESTDIR)$(libdir)/gimpbase.def
- else
-+libm = -lm
- install-libtool-import-lib:
- uninstall-libtool-import-lib:
- endif
-@@ -169,6 +170,7 @@ EXTRA_libgimpbase_@GIMP_API_VERSION@_la_DEPENDENCIES = $(gimpbase_def)
- libgimpbase_@GIMP_API_VERSION@_la_LIBADD = \
- 	$(GIO_LIBS)	\
- 	$(GEXIV2_LIBS)	\
-+	$(libm) \
- 	$(ole32_lib)
- 
- install-data-local: install-ms-lib install-libtool-import-lib


^ permalink raw reply related	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2018-01-06 16:42 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-10-25 23:02 [gentoo-commits] repo/gentoo:master commit in: media-gfx/gimp/files/ Sebastian Pipping
  -- strict thread matches above, loose matches on Subject: below --
2018-01-06 16:42 Sebastian Pipping
2016-12-22 16:04 Michael Palimaka

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox