openbsd-ports/x11/slim/Makefile
landry b6a02eab6a Add a bunch of patches to fix CVE-2009-1756, also reported in debian bz
#529306 & FreeBSD PR134801 :
The security issue is caused by slim generating the X authority file
by passing the X authority cookie via the command line to "xauth".
This can be exploited to disclose the X authority cookie by consulting
the process list and e.g. gain access the user's display.
While here, use slightly better random seeding for cookie generation.

Patches adapted from the ones provided to debian/FreeBSD by Eygene Ryabinkin <rea@codelabs.ru>
2009-09-04 20:24:25 +00:00

43 lines
984 B
Makefile

# $OpenBSD: Makefile,v 1.6 2009/09/04 20:24:25 landry Exp $
COMMENT= simple login manager
DISTNAME= slim-1.3.1
PKGNAME= ${DISTNAME}p0
CATEGORIES= x11
HOMEPAGE= http://slim.berlios.de/
MAINTAINER= Landry Breuil <gaston@gcu.info>
MASTER_SITES= ${MASTER_SITE_BERLIOS:=slim/}
# GPL
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
USE_X11= Yes
NO_REGRESS= Yes
LIB_DEPENDS= jpeg::graphics/jpeg \
png::graphics/png
WANTLIB= X11 Xft Xmu Xrender fontconfig c m stdc++ z freetype
MAKE_FILE= Makefile.openbsd
MAKE_FLAGS+= CFGDIR=${SYSCONFDIR}
FAKE_FLAGS+= PREFIX=${PREFIX} \
CFGDIR=${PREFIX}/share/examples/slim
pre-configure:
${SUBST_CMD} ${WRKSRC}/slim.1 ${WRKSRC}/slim.conf
post-install:
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/slim
${SUBST_CMD} -c ${FILESDIR}/README.OpenBSD \
${PREFIX}/share/doc/slim/README.OpenBSD
chown ${SHAREOWN}:${SHAREGRP} \
${PREFIX}/share/doc/slim/README.OpenBSD
.include <bsd.port.mk>