Commit Graph

30 Commits

Author SHA1 Message Date
ajacoutot
a9024260f2 Bump cups requirements. 2010-03-31 16:22:30 +00:00
jasper
683631fed7 SECURITY FIX:
CVE-2009-4270: Ghostscript "errprintf()" Buffer Overflow Vulnerability

ok kili@ (MAINTAINER)
2010-01-04 19:14:52 +00:00
sthen
2c90438f29 add a patch from upstream; fixes printing PDFs with canon drivers bjc600/800.
ok kili@
2009-06-16 21:03:59 +00:00
bernd
692ceb000e Sync after latest cups library bump. 2009-04-27 08:26:23 +00:00
jasper
56c787888b - add security fix for CVE-2009-0196
ok kili@ (MAINTAINER)
2009-04-16 19:53:38 +00:00
jasper
a41479263c - add SECURITY FIXES for SA34534, CVE-2009-0583 and CVE-2009-0584.
patches taken from upstream and gentoo bugreports

ok kili@ (MAINTAINER)
2009-04-06 17:06:33 +00:00
kili
e91fb64abf Build, install and use libgs in all flavors on shared archs. Note:
there is currently no libgs (not even a libgs.a) on static archs.

Install only *one* binary (bin/gs), even in the gtk flavor; the gsc
binary in the gtk flavor was identically to gsx, with the exception
that the display driver (which is the sole purpose of the gtk flavor)
didn't work in gsc.

ok ajacoutot@
2009-01-19 12:46:22 +00:00
kili
fe63fbce40 Use dlopen(2) for cups libraries to get rid of the cups flavor and
the evil circular dependencies.

Idea: bernd@
Tests: ajacoutot@
Catering: Sir Lancelot
Music: Dave Soldier and Komar & Melamid

ok ajacoutot@
2008-11-12 19:26:38 +00:00
kili
3e88a42347 Update to 8.63.
ok ajacoutot (who trusts me... hrhrhr)
2008-10-28 17:53:42 +00:00
kili
0983b83248 Instead of copying the address, just copy the color data.
Initially found by naddy grepping for suspicious casts.
Bug and patch approved upstream.
2008-07-12 19:11:56 +00:00
kili
cbb706a50f Fix the build of the gtk flavor on amd64.
Tested by steven@, who also found the problem.
2008-05-09 19:29:44 +00:00
kili
6cf57f0d06 Re-add some important files dropped with the last update.
Noticed by Onat I. <onatinadresi@gmail.com>, fix double-checked also
by Onat I. and Giovanni Bechis <bigionews@snb.it>.
2008-04-06 15:48:13 +00:00
kili
ed80eba166 Update to 8.62.
NOTE: the cups flavor will probably vanish very soon. See
http://marc.info/?l=openbsd-ports&m=120624299930920&w=2 for
explanation.

"looks ok", and some testing, jakemsr@
2008-04-01 20:37:00 +00:00
kili
a1f3aba027 Update to 8.60.
Add a cups flavor (for the pstoraster thingy).
Accept the truth and dake maintainership.

Tested by many.
ok simon@
2007-11-19 20:06:56 +00:00
kili
6610e8bb38 Use the pdf_sec.ps shipped with ghostcript 8.54, which has the minor
advance of actually working.
DIST_SUBDIR and Makefile.inc are obsolete now, so drop them.
Use included (and patched) jasper to simplify the update to gs 8.56.

ok jasper@, jakemsr@
"go for it", espie@
2007-05-26 12:25:10 +00:00
espie
e3f03f1e04 completely remove empty patches 2006-10-19 13:50:34 +00:00
kili
74af509bf2 Update to 8.54.
Some help by steven@ and espie@.

"commit" espie@
2006-10-19 13:12:37 +00:00
sturm
9e54b690c1 SHARED_LIBS, bump PKGNAME due to plist changes 2006-01-02 22:44:50 +00:00
alek
32a808351c - Don't set soname for libs
- Use devel/gettext MODULE
- Add WANTLIB markers
- Bump PKGNAME

go ahead brad@
2005-01-25 17:19:33 +00:00
brad
a205c353ca eliminate the possibility of two paths which are hardcoded
in the ghostscript binary including WRKINST.
2005-01-23 01:41:48 +00:00
brad
6a792cd6da Fix insecure tempfile creation in pj-gs.sh, ps2epsi, pv.sh and sysvlp.sh.
http://marc.theaimsgroup.com/?l=bugtraq&m=109655739113230&w=2
2004-10-24 20:58:47 +00:00
sturm
df3739bf41 honour CC 2004-05-31 16:23:25 +00:00
espie
39d237d1b4 -Wtraditional warns for functions with ISO C declarations in gcc3.
Loads of useless bogus warnings.
2003-12-30 02:29:12 +00:00
espie
c7ad8be2ab make sure non existent manpages don't get linked.
MORONIC cut&paste in Makefile. Some people really don't think.
Found out by fries and I, long story...
2003-08-11 23:11:29 +00:00
margarida
b88688d48b Security Fix:
A problem with Ghostscript could make it possible to execute
arbitrary commands. The vulnerability exists when GhostScript
is used to process specially formatted PS files.
An attacker can exploit this vulnerability by creating a
malicious PS file which, when processed with GhostScript, will
result in the execution of arbitrary system commands.

Bump version to 7.05p1

ok naddy@
2003-06-04 01:14:14 +00:00
pvalchev
19d7454260 pull string.h for some prototypes 2002-12-23 18:04:42 +00:00
espie
13a59e439f Update gnu ghostscript to 7.05, now that this is free.
Compared to AFPL ghostscript 7.00, main difference is some CJK support
(currently untested, needs keyed CJK fonts).
2002-12-03 13:17:07 +00:00
espie
95751534af Stupid typo... only GNU makes this possible, I guess. 2001-09-06 18:10:24 +00:00
espie
5254f2a8db Gnu ghostscript 6.51, mostly revamped aladdin ghostscript 6.50 2001-07-03 15:38:26 +00:00
espie
088b215766 New ghostscript port, living in a subdir.
Important changes:
- prodded by Nikolay Sturm to do the upgrade,
- Gnu-ghostscript is now 5.50, packaging changed slightly,
- most patches have been integrated,
- use MAKE_FLAGS to remove Makefile patches and gnu-make dependency,
- pull pdf_encrypt out from the main package so that gs can be distributed
on CD-Rom,
- simplify DEVICE_DEVS (get list from NetBSD), removed interactive script
for now, as it wasn't reliably upgraded,
- infrastructure allows for Aladdin ghostscript along-side.
2000-02-19 17:40:42 +00:00