diff options
author | kris <kris@FreeBSD.org> | 2001-02-11 12:33:35 +0800 |
---|---|---|
committer | kris <kris@FreeBSD.org> | 2001-02-11 12:33:35 +0800 |
commit | 994be5552f717b00c027d2ae5bb409df1ef4cd76 (patch) | |
tree | 7a627a42d18ee17e9677e6ad7dbef19d02e3418c /graphics | |
parent | d6b4b20002deed5e06ec14a8a6780da6d7c41f5c (diff) | |
download | freebsd-ports-gnome-994be5552f717b00c027d2ae5bb409df1ef4cd76.tar.gz freebsd-ports-gnome-994be5552f717b00c027d2ae5bb409df1ef4cd76.tar.zst freebsd-ports-gnome-994be5552f717b00c027d2ae5bb409df1ef4cd76.zip |
Update to new camediaplay version which fixes the format string
vulnerability by removing the '-N' option (also fixes the buffer overflow).
Thanks for itojun for the quick turnaround.
Diffstat (limited to 'graphics')
-rw-r--r-- | graphics/camediaplay/Makefile | 7 | ||||
-rw-r--r-- | graphics/camediaplay/pkg-install | 9 |
2 files changed, 1 insertions, 15 deletions
diff --git a/graphics/camediaplay/Makefile b/graphics/camediaplay/Makefile index 104bbb635b21..c9bd8f0694ed 100644 --- a/graphics/camediaplay/Makefile +++ b/graphics/camediaplay/Makefile @@ -6,7 +6,7 @@ # PORTNAME= camediaplay -PORTVERSION= 19991202 +PORTVERSION= 20010211 CATEGORIES= graphics MASTER_SITES= ftp://ftp.itojun.org/pub/digi-cam/C-400L/unix/ \ ftp://ftp.digipri.co.jp/pub/free-software/Olympus/C-400L/unix/ @@ -19,11 +19,6 @@ MAN1= camediaplay.1 DOC= README.english README.japanese PROTOCOL -pre-fetch: -.if !defined(BATCH) && !defined(PACKAGE_BUILDING) - ${SH} pkg-install -.endif - post-install: ${MKDIR} ${PREFIX}/share/doc/camediaplay for i in ${DOC}; do \ diff --git a/graphics/camediaplay/pkg-install b/graphics/camediaplay/pkg-install deleted file mode 100644 index 564aa6f6de4b..000000000000 --- a/graphics/camediaplay/pkg-install +++ /dev/null @@ -1,9 +0,0 @@ -#!/bin/sh - -if [ "$2" = "POST-INSTALL" -o -n "${PACKAGE_BUILDING}" ]; then - exit 0 -fi - -/usr/bin/dialog --yesno "SECURITY NOTE: This port is not safe to install on multi-user systems containing untrusted users - it is vulnerable to a local buffer overflow and format string vulnerability which allow an attacker to obtain access to the uucp user. Do you wish to proceed with the installation of the software anyway?" 9 70 || /usr/bin/false - - |