Commit Graph

110 Commits

Author SHA1 Message Date
jasper
3244356f4a Security fix for CVE-2022-38171.
See: https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6
2022-08-24 08:00:05 +00:00
naddy
8c80a751f8 drop RCS Ids 2022-03-11 20:02:12 +00:00
naddy
d8a3f55a2f Security fix for out-of-bounds writes CVE-2019-16927, CVE-2019-9877.
Extracted from upstream changes 4.01.01 -> 4.02.

Update homepage and master sites.

ok kn@ kili@
2019-10-04 18:27:34 +00:00
sthen
77f7cc9c61 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:49:33 +00:00
sthen
25f0e460f2 Add COMPILER lines to c++ ports which currently use the default. Adjust
some existing COMPILER lines with arch restrictions etc. In the usual
case this is now using "COMPILER = base-clang ports-gcc base-gcc" on
ports with c++ libraries in WANTLIB.

This is basically intended to be a noop on architectures using clang
as the system compiler, but help with other architectures where we
currently have many ports knocked out due to building with an unsuitable
compiler -

- some ports require c++11/newer so the GCC version in base that is used
on these archirtectures is too old.

- some ports have conflicts where an executable is built with one compiler
(e.g. gcc from base) but a library dependency is built with a different
one (e.g. gcc from ports), resulted in mixing incompatible libraries in the
same address space.

devel/gmp is intentionally skipped as it's on the path to building gcc -
the c++ library there is unused in ports (and not built by default upstream)
so intending to disable building gmpcxx in a future commit.
2018-10-24 14:27:57 +00:00
kili
389048d47b Switch back to xpdf-3.04 until printing works again.
Too many people suffered from it, and I don't know much time it
will take to fix it.
2017-11-08 18:30:24 +00:00
kili
ed678bfabd Oops! Forgot to properly cvs rm some patch files.
Noticed by naddy@.
2017-11-04 21:50:17 +00:00
kili
66b720c0a6 Update to xpdf-4.00.
Now uses qt5 instead of motif.

Printing doesn't work at the moment, sorry.

(prodded by some people from western and eastern europe)
2017-11-04 16:05:23 +00:00
sthen
5e964ab0df bump LIBCXX/LIBECXX/COMPILER_LIBCXX ports. 2017-07-26 22:45:14 +00:00
espie
8ac47fd9c6 use COMPILER_LIBCXX where applicable 2017-07-16 19:18:47 +00:00
sthen
073d25a37c use LIBCXX 2017-04-10 11:46:32 +00:00
naddy
c1fbcfee6b x11/openmotif -> x11/motif 2016-05-05 19:52:28 +00:00
ajacoutot
f41ba597e3 Cope with recent fonts directory change in ghostscript.
ok kili@
2015-04-06 21:05:07 +00:00
kili
eca796c51f Update to xpdf-3.04. 2014-06-08 18:56:33 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
ajacoutot
35882a6904 Remove xpdf-utils (replaced by poppler-utils). Only keep pdfdetach(1) which
is not in poppler.

input from and ok kili@
2012-06-06 18:28:22 +00:00
kili
4dd01b2023 Update to xpdf-3.03. 2011-10-01 19:46:35 +00:00
espie
46d3548829 normalize pkgpath 2011-09-16 11:41:38 +00:00
jasper
61f9ed9482 adjust after recent lesstif removal
ok aja@ sthen@
2011-04-10 18:00:23 +00:00
stsp
1bfd6642b1 Apply a patch to fix a heap overflow (poppler has the same fix, and xpdf
upstream will release this fix in xpdf-3.03).
Also apply a patch that kili@ lifted from poppler some time ago.
Both patches fix crashes seen with some PDF documents.

ok sthen, "don't wait for me" kili
2011-03-03 21:22:13 +00:00
miod
0b43f8cc7c Prevent more out-of-bounds aray accesses by ignoring hints referencing point
numbers out of the correct range; ok kili@, riding on the update.
2010-12-04 10:45:21 +00:00
miod
81ea9ff787 Update to xpdf 3.02pl5. ok kili@ 2010-12-04 10:44:31 +00:00
espie
811d94d9d6 new depends 2010-11-20 19:56:47 +00:00
espie
203cf6e974 prepare for motif lib-depends -> wantlib 2010-11-06 18:42:35 +00:00
ajacoutot
ff07e285bc Remove USE_X11. 2010-10-24 20:58:58 +00:00
espie
dcaa846fde USE_GROFF=Yes 2010-10-19 07:54:21 +00:00
jasper
88c0ccc707 - add security fix for CVE-2010-3702.
ok kili@ naddy@
2010-10-13 17:29:37 +00:00
jasper
bde4fd8027 Security fix for CVE-2010-3704. Patch from upstream poppler git. 2010-10-13 11:37:25 +00:00
jasper
89278da340 - give the urlCommand a slightly bigger chance of working
- regen patches
2010-05-27 14:55:40 +00:00
naddy
91db013e33 fix build and WANTLIB after libXp removal 2010-04-24 20:18:39 +00:00
kili
3cc74d2e32 Tell configure to use -lm.
Fixes the detection of openmotif after the latest update.
2009-12-16 14:00:23 +00:00
edd
cd256c4e71 update xpdf to 3.02.4. This addresses the following security issues:
CVE-2009-3603
CVE-2009-3604
CVE-2009-3605
CVE-2009-3606
CVE-2009-3608
CVE-2009-3609

Official patch from xpdf developers integrated into build.

OK kili@
2009-10-15 12:51:13 +00:00
kili
8fc6287292 WANTLIB changes after xcb addition and bump. 2009-08-10 06:29:51 +00:00
miod
341c29a6c7 Fix possible out of bounds access in xpath code, reported upstream; bump
package name. ok kili@
2009-05-30 22:35:56 +00:00
kili
02f903cb18 SECURITY: update to xpdf-3.02pl3 which fixes multiple vulnerabilities.
See http://rhn.redhat.com/errata/RHSA-2009-0430.html for details.

Also, fix license marker, update plists and simplify the pkgname
(dropping the pl, which seems to confuse bsd.port.mk's update
target).

ok naddy@, who had almost the same diff
2009-04-17 20:55:46 +00:00
naddy
e71b604a5c don't hardcode /usr/local and don't probe paths that don't exist on OpenBSD
ok steven@, kili@, landry@, sthen@
2009-04-04 14:45:48 +00:00
deanna
7d59c0e898 Simplify anti-DRM patches. Catches a new DRM check that slipped in
from upstream.

Diff from brad@, inspired by Floor on ports@

ok brad@, bernd@, pvalchev@, and a special "Kill the DRM!  DIE DIE
DIE!!!!!!!!" from todd@
2008-04-25 19:19:05 +00:00
bernd
972e5a3c90 Security fix for CVE-2008-1693. From Debian.
ok naddy@
2008-04-19 07:38:24 +00:00
landry
cca632a485 Finally, fix make install (spotted by markus lude at gmx.de)
fix from sthen@
ok sthen@ steven@
2008-02-14 08:52:35 +00:00
landry
fda5721896 Finally, make xpdf MULTI_PACKAGES, xpdf -main package provides x-depending
parts of xpdf, and xpdf -utils provides non-x-depending parts (replacing the
no_x11 flavor). Appropriate @conflict marker makes upgrade flawless.
While here, remove dependency on a specific version of auto* (prompted by naddy@)
(and remember me to never _ever_ touch xpdf again)

Change requested by naddy@ espie@
ok sthen@ naddy@
2008-02-13 16:18:33 +00:00
landry
4a655e71a5 Add a no_x11 FLAVOR, based on an initial submission by Jeremy Evans
Discussed with many on ports@

ok brad@
2008-02-10 20:25:13 +00:00
bernd
aee4790913 Update to xpdf-3.02pl2 which contains security fixes for CVE-2007-4352,
CVE-2007-5392 and CVE-2007-5393.

More info:
http://secunia.com/secunia_research/2007-88/advisory/

testing & ok simon@, jasper@
2007-11-09 07:15:12 +00:00
naddy
ad83bdd8a8 fix ASCII85 encoding on LP64 archs 2007-08-25 14:42:37 +00:00
naddy
981e5b9829 SECURITY fix for CVE-2007-3387.
Also remove former maintainer at his request.
ok kili@
2007-07-31 21:22:16 +00:00
espie
d4ebcd974d more base64 checksums 2007-04-05 17:26:05 +00:00
ckuethe
454f465537 Forgot to cvs rm this one too. Pointed out by marco 2007-03-30 04:32:13 +00:00
ckuethe
3b5bcac916 Update to xpdf 3.0.2, from Stuart Henderson and Brad Smith
Includes some security fixes

ok pvalchev, todd
2007-03-30 04:09:42 +00:00
espie
49a9142c53 new lib specs 2006-08-03 23:55:10 +00:00
bernd
5cef0e1aee Fix heap based buffer overflow.
From KDE. http://www.kde.org/info/security/advisory-20060202-1.txt

ok brad@
2006-02-05 09:59:00 +00:00
bernd
73df9cb65e Fix several security bugs in the xpdf code.
o iDefense advisories from 2005-12-05
o CAN-2005-3191, CAN-2005-3192, CAN-2005-3193

- JPX Stream Reader Heap Overflow Vulnerability
- DCTStream Baseline Heap Overflow Vulnerability
- DCTStream Progressive Heap Overflow
- StreamPredictor Heap Overflow Vulnerability

Patch provided by xpdf developers.
2005-12-07 09:22:14 +00:00