78171009d1
Zen Parse found a local buffer overflow in gv version 3.5.8 and earlier. Under this vulnerability, an attacker can create a carefully crafted, malformed PDF or PostScript file that, when viewed using gv, executes arbitrary commands on the system. http://marc.theaimsgroup.com/?l=bugtraq&m=103428425111983&w=2
27 lines
587 B
Makefile
27 lines
587 B
Makefile
# $OpenBSD: Makefile,v 1.19 2002/10/26 21:48:07 brad Exp $
|
|
|
|
COMMENT= "PostScript and PDF previewer"
|
|
|
|
DISTNAME= gv-3.5.8
|
|
PKGNAME= ${DISTNAME}p2
|
|
CATEGORIES= print
|
|
MASTER_SITES= ftp://ftpthep.physik.uni-mainz.de/pub/gv/unix/
|
|
|
|
# GPL
|
|
PERMIT_PACKAGE_CDROM= Yes
|
|
PERMIT_PACKAGE_FTP= Yes
|
|
PERMIT_DISTFILES_CDROM= Yes
|
|
PERMIT_DISTFILES_FTP= Yes
|
|
|
|
LIB_DEPENDS= Xaw3d.6.1::x11/Xaw3d
|
|
RUN_DEPENDS= :ghostscript-*:print/ghostscript/gnu
|
|
|
|
CONFIGURE_STYLE= imake
|
|
|
|
INSTALL_TARGET=install install.man install.doc
|
|
|
|
post-install:
|
|
${INSTALL_MAN} ${WRKSRC}/source/gv.0 ${PREFIX}/man/cat1
|
|
|
|
.include <bsd.port.mk>
|