pkgsrc/multimedia/adobe-flash-plugin11/Makefile

56 lines
1.4 KiB
Makefile
Raw Normal View History

# $NetBSD: Makefile,v 1.61 2016/06/16 16:30:06 tsutsui Exp $
DISTNAME= flash-plugin-${FLASH_VERSION}-release.${FLASH_ARCH}
PKGNAME= adobe-${DISTNAME:C/-release.*//}
CATEGORIES= multimedia www
Updated multimedia/adobe-flash-plugin11 to 11.1.102.55 Changes from 11.0.1.152 Critical vulnerabilities have been identified in Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445). This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455). This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456). This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457). This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460). ... now after reading the above, just how happy are people running this code from their browsers?
2011-11-12 23:01:48 +01:00
MASTER_SITES= http://fpdownload.macromedia.com/get/flashplayer/pdc/${FLASH_VERSION}/
MAINTAINER= pkgsrc-users@NetBSD.org
HOMEPAGE= http://www.adobe.com/products/flashplayer.html
COMMENT= Adobe Flash Player Browser plugin
LICENSE= flash-license
RESTRICTED= Redistribution not permitted
NO_BIN_ON_CDROM= ${RESTRICTED}
NO_BIN_ON_FTP= ${RESTRICTED}
NO_SRC_ON_CDROM= ${RESTRICTED}
NO_SRC_ON_FTP= ${RESTRICTED}
2015-01-04 04:41:59 +01:00
# On NetBSD, requires sufficiently new compat_linux.
NOT_FOR_PLATFORM= NetBSD-[0-4]*-* NetBSD-5.[0-9].*-*
WRKSRC= ${WRKDIR}
BUILD_DIRS= # empty
EXTRACT_SUFX= .rpm
CRYPTO= yes
EMUL_PLATFORMS= linux-i386 linux-x86_64
2013-12-12 03:35:33 +01:00
EMUL_MODULES.linux= gtk2 x11 krb5 alsa curl nss nspr
EMUL_REQD= suse>=11.3
FLASH_VERSION= 11.2.202.626
.include "../../mk/bsd.prefs.mk"
.if ${EMUL_PLATFORM} == "linux-i386"
FLASH_ARCH= i386
FLASH_LIBDIR= lib
.elif ${EMUL_PLATFORM} == "linux-x86_64"
FLASH_ARCH= x86_64
FLASH_LIBDIR= lib64
.endif
CONFLICTS= ns-flash-[0-9]*
NS_PLUGINS_DIR= ${PREFIX}/lib/netscape/plugins
.include "options.mk"
do-install:
${INSTALL_DATA_DIR} ${DESTDIR}${NS_PLUGINS_DIR}
${INSTALL_DATA} ${WRKSRC}/usr/${FLASH_LIBDIR}/flash-plugin/libflashplayer.so \
${DESTDIR}${NS_PLUGINS_DIR}
.include "../../mk/bsd.pkg.mk"