Version: 3.7.4, Package name: gv-3.7.4 |
Maintained by: The OpenBSD ports mailing-list |
Master sites: |
Description GNU gv allows to view and navigate through PostScript and PDF documents on an X display by providing a user interface for the ghostscript interpreter. |
Filesize: 741.491 KB |
Version History (View Complete History) |
|
2019-07-16 15:29:41 by Stuart Henderson | Files touched by this commit (19) |
Log message: Some ports using gnulib previously detected a broken realpath and switched to an internal replacement function. Following the changes to make realpath(3) use the __realpath() syscall these no longer detect broken realpath i.e. produce different code. Bump REVISION to ensure that users get the new version. |
2019-07-12 14:49:09 by Stuart Henderson | Files touched by this commit (854) |
Log message: replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes |
2016-09-13 12:52:06 by Christian Weisgerber | Files touched by this commit (23) |
Log message: replace libiconv module |
2016-03-05 10:42:01 by Stuart Henderson | Files touched by this commit (6) |
Log message: update to gv-3.7.4 |
2015-01-17 20:16:09 by Christian Weisgerber | Files touched by this commit (3349) |
Log message: Drop remaining MD5/RMD160/SHA1 checksums. |
2011-06-05 09:03:09 by Jasper Lievisse Adriaanse | Files touched by this commit (2) |
Log message: add a fix from freebsd to prevent gv from choking on pageup/down via james jerkins |
2010-11-20 02:48:40 by Marc Espie | Files touched by this commit (96) |
Log message: new depends |
2010-10-24 15:32:40 by Antoine Jacoutot | Files touched by this commit (17) |
Log message: Remove USE_X11. |
2010-10-18 15:25:09 by Marc Espie | Files touched by this commit (100) |
Log message: USE_GROFF=Yes |
2010-09-14 02:50:07 by Jasper Lievisse Adriaanse | Files touched by this commit (14) |
Log message: - long overdue update of gv to 3.7.1. among the many fixes are security fixes for CVE-2002-0838, CVE-2006-5864, CVE-2010-2055 and CVE-2010-2056 - tweak DESCR - fix MASTER_SITES/HOMEPAGE - update license version |
2010-04-24 14:18:40 by Christian Weisgerber | Files touched by this commit (59) |
Log message: fix build and WANTLIB after libXp removal |
2009-08-10 00:34:09 by Matthias Kilian | Files touched by this commit (33) |
Log message: WANTLIB changes after xcb addition and bump. |
2009-03-12 12:13:54 by Stuart Henderson | Files touched by this commit (7) |
Log message: sync WANTLIB/LIB_DEPENDS and bump |
2007-09-15 15:36:45 by Michael Erdely | Files touched by this commit (44) |
Log message: Remove surrounding quotes in COMMENT/PERMIT_*/ERRORS |
2007-04-05 10:20:19 by Marc Espie | Files touched by this commit (912) |
Log message: base64 checksums. |
2006-11-13 05:51:15 by Steven Mestdagh | Files touched by this commit (40) |
Log message: USE_X11 |
2006-08-03 17:28:12 by Marc Espie | Files touched by this commit (43) |
Log message: new lib specs |
2006-02-07 21:54:51 by David Krause | Files touched by this commit (53) |
Log message: move any perl or sed substitutions from post-patch to pre-configure (fixes make update-patches) ok sturm@; "looks reasonable" steven@ |
2005-02-21 07:32:46 by Aleksander Piotrowski | Files touched by this commit (1) |
Log message: Add WANTLIB marker |
2005-01-05 10:21:59 by Christian Weisgerber | Files touched by this commit (68) |
Log message: SIZE |
2004-11-23 15:45:21 by Aleksander Piotrowski | Files touched by this commit (3) |
Log message: - Append notice displayed by INSTALL to DESCR - Bump PKGNAME ok naddy@ sturm@ |
2004-09-15 12:32:15 by Marc Espie | Files touched by this commit (47) |
Log message: new plists |
2004-01-04 14:32:18 by Marc Espie | Files touched by this commit (2) |
Log message: avoid preprocessor hackery that turns out to be highly non-portable. |
2003-12-15 14:55:58 by Christian Weisgerber | Files touched by this commit (479) |
Log message: remove WWW lines |
2003-06-03 19:32:06 by Margarida Sequeira | Files touched by this commit (2) |
Log message: Add HOMEPAGE |
2003-02-06 12:44:20 by Anil Madhavapeddy | Files touched by this commit (1) |
Log message: typos and layout |
2003-02-04 15:59:48 by Christian Weisgerber | Files touched by this commit (11) |
Log message: add/fix RCS Ids; suggested by Jolan Luff <jolan@cryptonomicon.org> |
2002-10-28 06:40:42 by Christian Weisgerber | Files touched by this commit (15) |
Log message: No regression tests available. |
2002-10-27 19:12:08 by Brad Smith | Files touched by this commit (3) |
Log message: MFC: Disable gv's own setenv/getenv functions which are broken on most OpenBSD architectures and use the system ones instead. Bump PKGNAME |
2002-10-27 19:08:54 by Brad Smith | Files touched by this commit (3) |
Log message: MFC: Disable gv's own setenv/getenv functions which are broken on most OpenBSD architectures and use the system ones instead. Bump PKGNAME |
2002-10-27 18:55:17 by Brad Smith | Files touched by this commit (1) |
Log message: no longer necessary. |
2002-10-27 17:27:55 by Peter Valchev | Files touched by this commit (2) |
Log message: Disable gv's own setenv/getenv functions which are broken on most OpenBSD architectures and use the system ones instead. Bump PKGNAME 10x to various people who tested, brad OK |
2002-10-26 16:21:08 by Brad Smith | Files touched by this commit (2) |
Log message: MFC: Fix another security issue with gv. Zen Parse found a local buffer overflow in gv version 3.5.8 and earlier. Under this vulnerability, an attacker can create a carefully crafted, malformed PDF or PostScript file that, when viewed using gv, executes arbitrary commands on the system. http://marc.theaimsgroup.com/?l=bugtraq&m=103428425111983&w=2 |
2002-10-26 16:19:10 by Brad Smith | Files touched by this commit (2) |
Log message: MFC: Fix another security issue with gv. Zen Parse found a local buffer overflow in gv version 3.5.8 and earlier. Under this vulnerability, an attacker can create a carefully crafted, malformed PDF or PostScript file that, when viewed using gv, executes arbitrary commands on the system. http://marc.theaimsgroup.com/?l=bugtraq&m=103428425111983&w=2 |
2002-10-26 15:48:07 by Brad Smith | Files touched by this commit (2) |
Log message: Fix another security issue with gv. Zen Parse found a local buffer overflow in gv version 3.5.8 and earlier. Under this vulnerability, an attacker can create a carefully crafted, malformed PDF or PostScript file that, when viewed using gv, executes arbitrary commands on the system. http://marc.theaimsgroup.com/?l=bugtraq&m=103428425111983&w=2 |
2002-10-06 18:08:32 by Brad Smith | Files touched by this commit (2) |
Log message: Fix security issue with gv. When GV detects that the document is either a PDF file or a GZip compressed file, it executes some commands with the help of the system() function. Unfortunately, these commands contain the filename, which can be considered as untrusted user input. It is then possible to distribute a file (with a meticulously chosen filename, that even seems innocent) that causes execution of arbitrary shell commands when it is read with GV. http://www.epita.fr/~bevand_m/asa/asa-0000 |
2002-10-04 16:59:21 by Brad Smith | Files touched by this commit (2) |
Log message: Fix security issue with gv. When GV detects that the document is either a PDF file or a GZip compressed file, it executes some commands with the help of the system() function. Unfortunately, these commands contain the filename, which can be considered as untrusted user input. It is then possible to distribute a file (with a meticulously chosen filename, that even seems innocent) that causes execution of arbitrary shell commands when it is read with GV. http://www.epita.fr/~bevand_m/asa/asa-0000 |
2002-10-04 12:29:14 by Brad Smith | Files touched by this commit (4) |
Log message: Fix security issue with gv. When GV detects that the document is either a PDF file or a GZip compressed file, it executes some commands with the help of the system() function. Unfortunately, these commands contain the filename, which can be considered as untrusted user input. It is then possible to distribute a file (with a meticulously chosen filename, that even seems innocent) that causes execution of arbitrary shell commands when it is read with GV. http://www.epita.fr/~bevand_m/asa/asa-0000 |