aboutsummaryrefslogtreecommitdiffstats
path: root/graphics
diff options
context:
space:
mode:
authorkris <kris@FreeBSD.org>2001-02-11 12:33:35 +0800
committerkris <kris@FreeBSD.org>2001-02-11 12:33:35 +0800
commit994be5552f717b00c027d2ae5bb409df1ef4cd76 (patch)
tree7a627a42d18ee17e9677e6ad7dbef19d02e3418c /graphics
parentd6b4b20002deed5e06ec14a8a6780da6d7c41f5c (diff)
downloadfreebsd-ports-gnome-994be5552f717b00c027d2ae5bb409df1ef4cd76.tar.gz
freebsd-ports-gnome-994be5552f717b00c027d2ae5bb409df1ef4cd76.tar.zst
freebsd-ports-gnome-994be5552f717b00c027d2ae5bb409df1ef4cd76.zip
Update to new camediaplay version which fixes the format string
vulnerability by removing the '-N' option (also fixes the buffer overflow). Thanks for itojun for the quick turnaround.
Diffstat (limited to 'graphics')
-rw-r--r--graphics/camediaplay/Makefile7
-rw-r--r--graphics/camediaplay/pkg-install9
2 files changed, 1 insertions, 15 deletions
diff --git a/graphics/camediaplay/Makefile b/graphics/camediaplay/Makefile
index 104bbb635b21..c9bd8f0694ed 100644
--- a/graphics/camediaplay/Makefile
+++ b/graphics/camediaplay/Makefile
@@ -6,7 +6,7 @@
#
PORTNAME= camediaplay
-PORTVERSION= 19991202
+PORTVERSION= 20010211
CATEGORIES= graphics
MASTER_SITES= ftp://ftp.itojun.org/pub/digi-cam/C-400L/unix/ \
ftp://ftp.digipri.co.jp/pub/free-software/Olympus/C-400L/unix/
@@ -19,11 +19,6 @@ MAN1= camediaplay.1
DOC= README.english README.japanese PROTOCOL
-pre-fetch:
-.if !defined(BATCH) && !defined(PACKAGE_BUILDING)
- ${SH} pkg-install
-.endif
-
post-install:
${MKDIR} ${PREFIX}/share/doc/camediaplay
for i in ${DOC}; do \
diff --git a/graphics/camediaplay/pkg-install b/graphics/camediaplay/pkg-install
deleted file mode 100644
index 564aa6f6de4b..000000000000
--- a/graphics/camediaplay/pkg-install
+++ /dev/null
@@ -1,9 +0,0 @@
-#!/bin/sh
-
-if [ "$2" = "POST-INSTALL" -o -n "${PACKAGE_BUILDING}" ]; then
- exit 0
-fi
-
-/usr/bin/dialog --yesno "SECURITY NOTE: This port is not safe to install on multi-user systems containing untrusted users - it is vulnerable to a local buffer overflow and format string vulnerability which allow an attacker to obtain access to the uucp user. Do you wish to proceed with the installation of the software anyway?" 9 70 || /usr/bin/false
-
-