openbsd-ports/net/bitchx/Makefile
brad 42f9b24893 Fix a buffer overflow in the DNS resolution code. A buffer overflow
within the resolver code makes it possible to overwrite stack
variables by generating a malformed DNS packet. This problem makes
it possible to create a situation where a malicious user may be
able to execute code remotely with the UID and GID of the BitchX
client. It is necessary for an attacker to control their own DNS
to exploit this bug.
2000-12-13 14:37:08 +00:00

35 lines
854 B
Makefile

# $OpenBSD: Makefile,v 1.30 2000/12/13 14:37:08 brad Exp $
# $FreeBSD: Makefile,v 1.3 1998/07/21 11:38:44 eivind Exp $
VERSION= 1.0c17
DISTNAME= BitchX-${VERSION}
PKGNAME= bitchx-${VERSION}p1
CATEGORIES= net
NEED_VERSION= 1.336
MASTER_SITES= ftp://ftp.bitchx.com/pub/BitchX/source/ \
ftp://ftp.bitchx.org/pub/BitchX/source/ \
ftp://bitchx.dimension6.com/pub/BitchX/source/
MAINTAINER= Brad Smith <brad@openbsd.org>
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
SUBST_VARS= VERSION
SEPARATE_BUILD= concurrent
USE_GMAKE= Yes
CONFIGURE_STYLE= gnu dest
FAKE_FLAGS= INSTALL="${INSTALL_PROGRAM}" INSTALL_DATA="${INSTALL_DATA}"
WRKDIST= ${WRKDIR}/BitchX
post-install:
@cd ${PREFIX}/bin && ln -sf BitchX-${VERSION} BitchX
@chown -R root.wheel ${PREFIX}/share/bitchx
.include <bsd.port.mk>