openbsd-ports/print/gv/Makefile
brad 78171009d1 Fix another security issue with gv.
Zen Parse found a local buffer overflow in gv version 3.5.8 and earlier.

Under this vulnerability, an attacker can create a carefully crafted,
malformed PDF or PostScript file that, when viewed using gv, executes
arbitrary commands on the system.

http://marc.theaimsgroup.com/?l=bugtraq&m=103428425111983&w=2
2002-10-26 21:48:07 +00:00

27 lines
587 B
Makefile

# $OpenBSD: Makefile,v 1.19 2002/10/26 21:48:07 brad Exp $
COMMENT= "PostScript and PDF previewer"
DISTNAME= gv-3.5.8
PKGNAME= ${DISTNAME}p2
CATEGORIES= print
MASTER_SITES= ftp://ftpthep.physik.uni-mainz.de/pub/gv/unix/
# GPL
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
LIB_DEPENDS= Xaw3d.6.1::x11/Xaw3d
RUN_DEPENDS= :ghostscript-*:print/ghostscript/gnu
CONFIGURE_STYLE= imake
INSTALL_TARGET=install install.man install.doc
post-install:
${INSTALL_MAN} ${WRKSRC}/source/gv.0 ${PREFIX}/man/cat1
.include <bsd.port.mk>