jasper
3244356f4a
Security fix for CVE-2022-38171.
...
See: https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6
2022-08-24 08:00:05 +00:00
naddy
8c80a751f8
drop RCS Ids
2022-03-11 20:02:12 +00:00
naddy
d8a3f55a2f
Security fix for out-of-bounds writes CVE-2019-16927, CVE-2019-9877.
...
Extracted from upstream changes 4.01.01 -> 4.02.
Update homepage and master sites.
ok kn@ kili@
2019-10-04 18:27:34 +00:00
sthen
77f7cc9c61
replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes
2019-07-12 20:49:33 +00:00
sthen
25f0e460f2
Add COMPILER lines to c++ ports which currently use the default. Adjust
...
some existing COMPILER lines with arch restrictions etc. In the usual
case this is now using "COMPILER = base-clang ports-gcc base-gcc" on
ports with c++ libraries in WANTLIB.
This is basically intended to be a noop on architectures using clang
as the system compiler, but help with other architectures where we
currently have many ports knocked out due to building with an unsuitable
compiler -
- some ports require c++11/newer so the GCC version in base that is used
on these archirtectures is too old.
- some ports have conflicts where an executable is built with one compiler
(e.g. gcc from base) but a library dependency is built with a different
one (e.g. gcc from ports), resulted in mixing incompatible libraries in the
same address space.
devel/gmp is intentionally skipped as it's on the path to building gcc -
the c++ library there is unused in ports (and not built by default upstream)
so intending to disable building gmpcxx in a future commit.
2018-10-24 14:27:57 +00:00
kili
389048d47b
Switch back to xpdf-3.04 until printing works again.
...
Too many people suffered from it, and I don't know much time it
will take to fix it.
2017-11-08 18:30:24 +00:00
kili
ed678bfabd
Oops! Forgot to properly cvs rm some patch files.
...
Noticed by naddy@.
2017-11-04 21:50:17 +00:00
kili
66b720c0a6
Update to xpdf-4.00.
...
Now uses qt5 instead of motif.
Printing doesn't work at the moment, sorry.
(prodded by some people from western and eastern europe)
2017-11-04 16:05:23 +00:00
sthen
5e964ab0df
bump LIBCXX/LIBECXX/COMPILER_LIBCXX ports.
2017-07-26 22:45:14 +00:00
espie
8ac47fd9c6
use COMPILER_LIBCXX where applicable
2017-07-16 19:18:47 +00:00
sthen
073d25a37c
use LIBCXX
2017-04-10 11:46:32 +00:00
naddy
c1fbcfee6b
x11/openmotif -> x11/motif
2016-05-05 19:52:28 +00:00
ajacoutot
f41ba597e3
Cope with recent fonts directory change in ghostscript.
...
ok kili@
2015-04-06 21:05:07 +00:00
kili
eca796c51f
Update to xpdf-3.04.
2014-06-08 18:56:33 +00:00
espie
eae66e4a7b
PERMIT_* / REGRESS->TEST sweep
2013-03-11 11:35:43 +00:00
ajacoutot
35882a6904
Remove xpdf-utils (replaced by poppler-utils). Only keep pdfdetach(1) which
...
is not in poppler.
input from and ok kili@
2012-06-06 18:28:22 +00:00
kili
4dd01b2023
Update to xpdf-3.03.
2011-10-01 19:46:35 +00:00
espie
46d3548829
normalize pkgpath
2011-09-16 11:41:38 +00:00
jasper
61f9ed9482
adjust after recent lesstif removal
...
ok aja@ sthen@
2011-04-10 18:00:23 +00:00
stsp
1bfd6642b1
Apply a patch to fix a heap overflow (poppler has the same fix, and xpdf
...
upstream will release this fix in xpdf-3.03).
Also apply a patch that kili@ lifted from poppler some time ago.
Both patches fix crashes seen with some PDF documents.
ok sthen, "don't wait for me" kili
2011-03-03 21:22:13 +00:00
miod
0b43f8cc7c
Prevent more out-of-bounds aray accesses by ignoring hints referencing point
...
numbers out of the correct range; ok kili@, riding on the update.
2010-12-04 10:45:21 +00:00
miod
81ea9ff787
Update to xpdf 3.02pl5. ok kili@
2010-12-04 10:44:31 +00:00
espie
811d94d9d6
new depends
2010-11-20 19:56:47 +00:00
espie
203cf6e974
prepare for motif lib-depends -> wantlib
2010-11-06 18:42:35 +00:00
ajacoutot
ff07e285bc
Remove USE_X11.
2010-10-24 20:58:58 +00:00
espie
dcaa846fde
USE_GROFF=Yes
2010-10-19 07:54:21 +00:00
jasper
88c0ccc707
- add security fix for CVE-2010-3702.
...
ok kili@ naddy@
2010-10-13 17:29:37 +00:00
jasper
bde4fd8027
Security fix for CVE-2010-3704. Patch from upstream poppler git.
2010-10-13 11:37:25 +00:00
jasper
89278da340
- give the urlCommand a slightly bigger chance of working
...
- regen patches
2010-05-27 14:55:40 +00:00
naddy
91db013e33
fix build and WANTLIB after libXp removal
2010-04-24 20:18:39 +00:00
kili
3cc74d2e32
Tell configure to use -lm.
...
Fixes the detection of openmotif after the latest update.
2009-12-16 14:00:23 +00:00
edd
cd256c4e71
update xpdf to 3.02.4. This addresses the following security issues:
...
CVE-2009-3603
CVE-2009-3604
CVE-2009-3605
CVE-2009-3606
CVE-2009-3608
CVE-2009-3609
Official patch from xpdf developers integrated into build.
OK kili@
2009-10-15 12:51:13 +00:00
kili
8fc6287292
WANTLIB changes after xcb addition and bump.
2009-08-10 06:29:51 +00:00
miod
341c29a6c7
Fix possible out of bounds access in xpath code, reported upstream; bump
...
package name. ok kili@
2009-05-30 22:35:56 +00:00
kili
02f903cb18
SECURITY: update to xpdf-3.02pl3 which fixes multiple vulnerabilities.
...
See http://rhn.redhat.com/errata/RHSA-2009-0430.html for details.
Also, fix license marker, update plists and simplify the pkgname
(dropping the pl, which seems to confuse bsd.port.mk's update
target).
ok naddy@, who had almost the same diff
2009-04-17 20:55:46 +00:00
naddy
e71b604a5c
don't hardcode /usr/local and don't probe paths that don't exist on OpenBSD
...
ok steven@, kili@, landry@, sthen@
2009-04-04 14:45:48 +00:00
deanna
7d59c0e898
Simplify anti-DRM patches. Catches a new DRM check that slipped in
...
from upstream.
Diff from brad@, inspired by Floor on ports@
ok brad@, bernd@, pvalchev@, and a special "Kill the DRM! DIE DIE
DIE!!!!!!!!" from todd@
2008-04-25 19:19:05 +00:00
bernd
972e5a3c90
Security fix for CVE-2008-1693. From Debian.
...
ok naddy@
2008-04-19 07:38:24 +00:00
landry
cca632a485
Finally, fix make install (spotted by markus lude at gmx.de)
...
fix from sthen@
ok sthen@ steven@
2008-02-14 08:52:35 +00:00
landry
fda5721896
Finally, make xpdf MULTI_PACKAGES, xpdf -main package provides x-depending
...
parts of xpdf, and xpdf -utils provides non-x-depending parts (replacing the
no_x11 flavor). Appropriate @conflict marker makes upgrade flawless.
While here, remove dependency on a specific version of auto* (prompted by naddy@)
(and remember me to never _ever_ touch xpdf again)
Change requested by naddy@ espie@
ok sthen@ naddy@
2008-02-13 16:18:33 +00:00
landry
4a655e71a5
Add a no_x11 FLAVOR, based on an initial submission by Jeremy Evans
...
Discussed with many on ports@
ok brad@
2008-02-10 20:25:13 +00:00
bernd
aee4790913
Update to xpdf-3.02pl2 which contains security fixes for CVE-2007-4352,
...
CVE-2007-5392 and CVE-2007-5393.
More info:
http://secunia.com/secunia_research/2007-88/advisory/
testing & ok simon@, jasper@
2007-11-09 07:15:12 +00:00
naddy
ad83bdd8a8
fix ASCII85 encoding on LP64 archs
2007-08-25 14:42:37 +00:00
naddy
981e5b9829
SECURITY fix for CVE-2007-3387.
...
Also remove former maintainer at his request.
ok kili@
2007-07-31 21:22:16 +00:00
espie
d4ebcd974d
more base64 checksums
2007-04-05 17:26:05 +00:00
ckuethe
454f465537
Forgot to cvs rm this one too. Pointed out by marco
2007-03-30 04:32:13 +00:00
ckuethe
3b5bcac916
Update to xpdf 3.0.2, from Stuart Henderson and Brad Smith
...
Includes some security fixes
ok pvalchev, todd
2007-03-30 04:09:42 +00:00
espie
49a9142c53
new lib specs
2006-08-03 23:55:10 +00:00
bernd
5cef0e1aee
Fix heap based buffer overflow.
...
From KDE. http://www.kde.org/info/security/advisory-20060202-1.txt
ok brad@
2006-02-05 09:59:00 +00:00
bernd
73df9cb65e
Fix several security bugs in the xpdf code.
...
o iDefense advisories from 2005-12-05
o CAN-2005-3191, CAN-2005-3192, CAN-2005-3193
- JPX Stream Reader Heap Overflow Vulnerability
- DCTStream Baseline Heap Overflow Vulnerability
- DCTStream Progressive Heap Overflow
- StreamPredictor Heap Overflow Vulnerability
Patch provided by xpdf developers.
2005-12-07 09:22:14 +00:00