summaryrefslogtreecommitdiff
path: root/graphics
diff options
context:
space:
mode:
authorKris Kennaway <kris@FreeBSD.org>2001-02-11 04:33:35 +0000
committerKris Kennaway <kris@FreeBSD.org>2001-02-11 04:33:35 +0000
commit2b25949f5bfb74ecc43489ff952c5e066ae8ef7e (patch)
tree0f42852cdfaf0201cd3f6e12bd6c8dfdd65ae9e0 /graphics
parentUpgrade to 2.4.9 (diff)
Update to new camediaplay version which fixes the format string
vulnerability by removing the '-N' option (also fixes the buffer overflow). Thanks for itojun for the quick turnaround.
Diffstat (limited to 'graphics')
-rw-r--r--graphics/camediaplay/Makefile7
-rw-r--r--graphics/camediaplay/pkg-install9
2 files changed, 1 insertions, 15 deletions
diff --git a/graphics/camediaplay/Makefile b/graphics/camediaplay/Makefile
index 104bbb635b21..c9bd8f0694ed 100644
--- a/graphics/camediaplay/Makefile
+++ b/graphics/camediaplay/Makefile
@@ -6,7 +6,7 @@
#
PORTNAME= camediaplay
-PORTVERSION= 19991202
+PORTVERSION= 20010211
CATEGORIES= graphics
MASTER_SITES= ftp://ftp.itojun.org/pub/digi-cam/C-400L/unix/ \
ftp://ftp.digipri.co.jp/pub/free-software/Olympus/C-400L/unix/
@@ -19,11 +19,6 @@ MAN1= camediaplay.1
DOC= README.english README.japanese PROTOCOL
-pre-fetch:
-.if !defined(BATCH) && !defined(PACKAGE_BUILDING)
- ${SH} pkg-install
-.endif
-
post-install:
${MKDIR} ${PREFIX}/share/doc/camediaplay
for i in ${DOC}; do \
diff --git a/graphics/camediaplay/pkg-install b/graphics/camediaplay/pkg-install
deleted file mode 100644
index 564aa6f6de4b..000000000000
--- a/graphics/camediaplay/pkg-install
+++ /dev/null
@@ -1,9 +0,0 @@
-#!/bin/sh
-
-if [ "$2" = "POST-INSTALL" -o -n "${PACKAGE_BUILDING}" ]; then
- exit 0
-fi
-
-/usr/bin/dialog --yesno "SECURITY NOTE: This port is not safe to install on multi-user systems containing untrusted users - it is vulnerable to a local buffer overflow and format string vulnerability which allow an attacker to obtain access to the uucp user. Do you wish to proceed with the installation of the software anyway?" 9 70 || /usr/bin/false
-
-