juanfra
dc0d0a5b1f
Update to lzip 1.17.
2015-08-11 20:57:15 +00:00
juanfra
0fd4fe0214
Update to plzip 1.4.
2015-07-22 22:23:52 +00:00
juanfra
a483dec4a3
Update to lzlib 1.7.
2015-07-21 00:41:08 +00:00
sthen
45cf31de01
update to LZ4 r131
2015-07-18 21:25:12 +00:00
jasper
0cfe5a2805
use sed -i
2015-07-17 21:13:14 +00:00
juanfra
a0912f7a1e
Update to clzip 1.7.
2015-07-17 18:06:05 +00:00
ajacoutot
2889a1d16f
Remove the perl bullshit.
2015-07-16 23:57:18 +00:00
naddy
e2f2775dbd
remove some obsolete/useless/crufty schilyware
...
ok sthen@ ajacoutot@ dcoppa@ ian@
2015-06-25 21:45:59 +00:00
sebastia
1a53146871
Use my openbsd.org e-mail address as in all the other ports
2015-06-25 06:40:04 +00:00
sthen
6f278e1d15
update to lz4 r130
2015-06-22 20:46:24 +00:00
sthen
7e4a372ae9
update to pecl-lzf, from maintainer Johan Huldtgren
2015-06-19 16:46:34 +00:00
sebastia
84c55e4695
bye bye ruby-archive-tar-minitar
2015-06-19 06:17:33 +00:00
sebastia
bd97a0853b
replace ruby-archive-tar-minitar with ruby-minitar
2015-06-19 06:15:31 +00:00
sebastia
f0f493d50f
Archive::Tar::Minitar is a pure-Ruby library and command-line utility
...
that provides the ability to deal with POSIX tar(1) archive files. The
implementation is based heavily on Mauricio Fernandez's implementation
in rpa-base, but has been reorganised to promote reuse in other
projects.
This is going to replace archivers/ruby-archive-tar-minitar and to be
used by sysutils/ruby-r10k update.
OK jasper@
2015-06-19 06:14:07 +00:00
naddy
7fcbb927b2
Update to 1.6.
...
This release fixes the extraction to absolute file names with invalid
UTF-8 characters (CVE-2015-2060), which had already been fixed in
the port.
The security patch in the port for CVE-2014-9556 was already obsoleted
by extended input validation in 1.5.
ok jca@
2015-06-13 20:31:32 +00:00
juanfra
2a990c0463
Update to lziprecover 1.17.
2015-06-09 11:40:51 +00:00
juanfra
f11c01ccde
Update to lunzip 1.7.
2015-06-06 21:34:01 +00:00
juanfra
c798abe9c5
Update to pdlzip 1.6.
2015-06-05 11:42:55 +00:00
robert
9c1017ae2d
bump revision due to the change of the default php version to 5.6
...
ok aja@
2015-06-05 06:00:20 +00:00
ajacoutot
1ba1807e46
+gcab
2015-05-27 06:49:24 +00:00
ajacoutot
096d3b814d
Import gcab-0.6.
...
GObject library to create cabinet files.
ok robert@
2015-05-27 06:47:59 +00:00
ajacoutot
a183b75553
"/usr/local/lib/pkgconfig/" is part of mtree(8).
...
Packages should not own this dir to prevent its deletion or a warning that it
cannot be removed because it's not empty at pkg_delete(1) time.
2015-05-22 11:31:10 +00:00
jasper
7e7ecc3b15
remove another bunch of @rm -f, some of which were hiding the arguments no
...
longer existed
2015-05-18 11:29:37 +00:00
sthen
fe84f97f78
update to lz4-r129
2015-05-15 15:32:00 +00:00
ajacoutot
fe9bf95b16
+unzip,iconv
2015-05-11 23:07:21 +00:00
jasper
89d6207e73
update to libzip-1.0.1
2015-05-11 21:22:19 +00:00
czarkoff
c0c449206d
consistent spacing
...
OK sthen@
2015-05-11 21:22:06 +00:00
czarkoff
87e407f2c6
add "iconv" flavor
...
OK sthen@, stsp@
2015-05-11 21:19:23 +00:00
jasper
00c8abbfa6
update to deco-1.6.3/deco-archive-1.6
2015-05-11 20:31:13 +00:00
sthen
764d4a86fe
add some missing pthread to WANTLIB
...
(using modified portbump, thanks zhuk@)
"exciting" one in databases/py-sqlalchemy; port had a bad PKG_ARCH=* line
and also contained .so modules.
2015-04-21 18:40:20 +00:00
jca
b9a00f3919
Fold long line.
2015-04-19 17:53:59 +00:00
jca
5500f89cc2
Fix incorrect logic leading to a fatal assert when using the -q flag.
...
Ports patch from Mikolaj Kucharski, source patch from Debian
(https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=299658 ),
upstream issue: http://sourceforge.net/p/parchive/bugs/37/
2015-04-19 17:52:47 +00:00
naddy
d8f86af3c9
update to upstream tarball 5.2.7, still labeled version 5.21
2015-04-10 20:32:12 +00:00
naddy
074951595a
update to 3.1.2; with jasper@
2015-04-04 11:05:19 +00:00
sthen
9500439bfe
Patch libzip for CVE-2015-2331; int overflow leading to a heap overflow.
...
Upstream's patch depends on other changes; for us, we can simplify things
and just use reallocarray.
2015-04-03 18:20:49 +00:00
naddy
4946712c9c
update to 5.21
2015-04-03 11:58:51 +00:00
naddy
81691e03a5
Security fix for
...
CVE-2015-2063: buffer overflow when reading bogus file headers
The header parser was not checking if it had read enough data when
trying to parse the header from memory, causing it to accept files
with headers smaller than expected.
From Debian
2015-04-03 11:26:26 +00:00
naddy
b522e1f179
maintenance update to 5.2.1 and enable multi-threading; mostly from brad@
2015-03-31 18:00:23 +00:00
naddy
c1d595ad3d
CVE-2014-9112: Heap-based buffer overflow in the process_copy_in
...
function allows remote attackers to cause a denial of service via
a large block value in a cpio archive.
Fix from a series of upstream commits by Sergey Poznyakoff, via Debian.
CVE-2015-1197: cpio, when using the --no-absolute-filenames option,
allows local users to write to arbitrary files via a symlink attack
on a file in an archive.
Fix from Vitezslav Cizek after 3.5 years of gestation in the SUSE
bug tracker, via Debian.
Also apply an upstream fix for some regression tests while here.
2015-03-31 15:36:52 +00:00
benoit
a5bcb4ccdc
Update to p5-PerlIO-gzip-0.19.
2015-03-29 09:23:49 +00:00
juanfra
d7718fd83f
Update to p7zip 9.38.1. From Josh Grosse (MAINTAINER).
2015-03-16 17:20:40 +00:00
juanfra
916d6eef26
Update to pigz 2.3.3. From Thomas Pfaff (MAINTAINER).
2015-03-16 16:26:15 +00:00
sthen
63f1718ad8
update to lzo2-2.09 and take MAINTAINER
2015-03-16 09:40:10 +00:00
benoit
8995b4a1a1
Update to p5-Compress-Bzip2-2.22.
2015-03-15 17:45:11 +00:00
naddy
2235cd4981
switch from "-static" to "${STATIC}, i.e., build static PIE executables
...
on most archs
2015-03-14 20:52:46 +00:00
sthen
864bbedd53
Fix directory-traversal vulnerability involving long UTF-8 encodings.
...
Nice write-up at http://www.openwall.com/lists/oss-security/2015/02/18/3
2015-02-18 13:04:09 +00:00
naddy
eae40dae37
Security fixes:
...
CVE-2014-8139: CRC32 verification heap-based overflow
CVE-2014-8140: out-of-bounds write issue in test_compr_eb()
CVE-2014-8141: out-of-bounds read issues in getZip64Data()
CVE-2014-9636: out-of-bounds read/write in test_compr_eb()
Via Debian; ok sthen@
2015-02-06 21:37:04 +00:00
sthen
3ad6c95bf2
Force a WANTLIB on libc for ports linked statically, to ensure they get updated
...
following major updates in base. kurt is ok with this approach. ok naddy
2015-02-04 21:16:11 +00:00
sthen
4e81609896
update to cabextract 1.5, embedded copy of libmspack is updated for
...
security fixes (see recent commit to archivers/libmspack), additionally
cabextract now replaces bad Unicode characters in filenames with the
standard Unicode replacement character.
2015-02-04 09:51:53 +00:00
sthen
34c7f77418
update to libmspack 0.5alpha (part 2: cvs didn't see the patches/ dir)
...
null pointer dereference on a crafted CAB:
- https://bugs.debian.org/774665
CHM decompression: division by zero
- https://bugs.debian.org/774725
CHM decompression: pointer arithmetic overflow
- https://bugs.debian.org/774726
off-by-one buffer over-read in mspack/mszipd.c
- https://bugs.debian.org/775498
off-by-one buffer under-read in mspack/lzxd.c
- https://bugs.debian.org/775499
CHM decompression: another pointer arithmetic overflow
- https://bugs.debian.org/775687
2015-02-04 09:46:37 +00:00