298dde72b0
"Some vulnerabilities have been reported in libTIFF, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. The vulnerabilities are caused due to various heap and integer overflows when processing TIFF images and can be exploited via a specially crafted TIFF image. Successful exploitation allows crashing applications linked against libTIFF and may also allow execution of arbitrary code." http://secunia.com/advisories/21304/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465 Patches from Tavis Ormandy, Google Security Team via SUSE. Bump PKGREVISION.
32 lines
857 B
Makefile
32 lines
857 B
Makefile
# $NetBSD: Makefile,v 1.84 2006/08/02 15:42:25 salo Exp $
|
|
|
|
DISTNAME= tiff-3.8.2
|
|
PKGREVISION= 3
|
|
CATEGORIES= graphics
|
|
MASTER_SITES= ftp://ftp.remotesensing.org/pub/libtiff/ \
|
|
http://libtiff.maptools.org/dl/
|
|
|
|
MAINTAINER= pkgsrc-users@NetBSD.org
|
|
HOMEPAGE= http://www.remotesensing.org/libtiff/
|
|
COMMENT= Library and tools for reading and writing TIFF data files
|
|
|
|
EXTRACT_ONLY= ${DISTNAME}${EXTRACT_SUFX}
|
|
|
|
PKG_INSTALLATION_TYPES= overwrite pkgviews
|
|
|
|
USE_LANGUAGES= c c++
|
|
USE_LIBTOOL= yes
|
|
|
|
GNU_CONFIGURE= yes
|
|
CONFIGURE_ARGS+= --enable-rpath
|
|
CONFIGURE_ARGS+= --enable-cxx
|
|
CONFIGURE_ARGS+= --with-docdir=${PREFIX}/share/doc/tiff
|
|
CONFIGURE_ARGS+= --without-x # just in case detects gl to build tiffgt
|
|
|
|
TEST_TARGET= check
|
|
|
|
.include "options.mk"
|
|
|
|
.include "../../devel/zlib/buildlink3.mk"
|
|
.include "../../graphics/jpeg/buildlink3.mk"
|
|
.include "../../mk/bsd.pkg.mk"
|