#
351008 |
|
14-Aug-2019 |
delphij |
MFC r350855: Upgrade to Bzip2 version 1.0.8.
|
#
349719 |
|
04-Jul-2019 |
delphij |
MFC r349505: Upgrade to Bzip2 version 1.0.7.
|
#
312061 |
|
13-Jan-2017 |
amdmi3 |
MFC r310718:
bzip2 does not exit after showing license as requested with --version or --license as most apps would do, instead it waits for data to compress on stdin. Because of that, if `bzip2 --version' is called, bogus `bzip2: I won't write compressed data to a terminal' error message will be displayed, and checking for bzip2 version in scripts as in
bzip2 --version 2>&1 | grep -o "Version [^,]*"
will hand as bzip2 would wait for data to compress on stdin. Fix this by exiting right after showing version/license text.
I've tried to push this upstream for more than a year, but author is unresponsive, so upstream may be considered dead.
Ubuntu applies similar fix, for the note.
PR: 199443 Approved by: dim, bapt Differential Revision: D8924
|
#
256281 |
|
10-Oct-2013 |
gjb |
Copy head (r256279) to stable/10 as part of the 10.0-RELEASE cycle.
Approved by: re (implicit) Sponsored by: The FreeBSD Foundation |
#
215041 |
|
09-Nov-2010 |
obrien |
Upgrade to Bzip2 version 1.0.6.
Reviewed by: SO (cperciva)
|
#
177424 |
|
20-Mar-2008 |
delphij |
Resolve conflicts.
|
#
167977 |
|
28-Mar-2007 |
delphij |
bzip2.c: SA-05:14.bzip2 has been resolved by the author in a different way. Make the file just the same as it is in the vendor branch to make it easier for future upgrade.
|
#
147666 |
|
29-Jun-2005 |
simon |
Fix ipfw packet matching errors with address tables.
The ipfw tables lookup code caches the result of the last query. The kernel may process multiple packets concurrently, performing several concurrent table lookups. Due to an insufficient locking, a cached result can become corrupted that could cause some addresses to be incorrectly matched against a lookup table.
Submitted by: ru Reviewed by: csjp, mlaier Security: CAN-2005-2019 Security: FreeBSD-SA-05:13.ipfw
Correct bzip2 permission race condition vulnerability.
Obtained from: Steve Grubb via RedHat Security: CAN-2005-0953 Security: FreeBSD-SA-05:14.bzip2 Approved by: obrien
Correct TCP connection stall denial of service vulnerability.
A TCP packets with the SYN flag set is accepted for established connections, allowing an attacker to overwrite certain TCP options.
Submitted by: Noritoshi Demizu Reviewed by: andre, Mohan Srinivasan Security: CAN-2005-2068 Security: FreeBSD-SA-05:15.tcp
Approved by: re (security blanket), cperciva
|
#
146294 |
|
16-May-2005 |
obrien |
This commit was generated by cvs2svn to compensate for changes in r146293, which included commits to RCS files with non-trunk default branches.
|
#
146293 |
|
16-May-2005 |
obrien |
Virgin import (trimmed) of Bzip2 version 1.0.3.
|
#
90067 |
|
01-Feb-2002 |
sobomax |
Virgin import (trimmed) of Bzip2 version 1.0.2
|
#
78556 |
|
21-Jun-2001 |
obrien |
Virgin import (trimmed) of Bzip2 version 1.0.1.
|