91b924d6d0
Changelog: security: fixed a stack overflow vulnerability that occurred when command line arguments (whole addresses, host names, file names) were longer than 512 bytes. Note that this could only be exploited when an attacker was able to inject data into socat's command line. Full credits to Felix Grobert, Google Security Team, for finding and reporting this issue
37 lines
1.1 KiB
Makefile
37 lines
1.1 KiB
Makefile
# $NetBSD: Makefile,v 1.24 2010/08/12 17:54:14 zafer Exp $
|
|
|
|
DISTNAME= socat-1.7.1.3
|
|
CATEGORIES= net
|
|
MASTER_SITES= http://www.dest-unreach.org/socat/download/
|
|
|
|
MAINTAINER= pkgsrc-users@NetBSD.org
|
|
HOMEPAGE= http://www.dest-unreach.org/socat/
|
|
COMMENT= "netcat++" (extended design, new implementation)
|
|
LICENSE= gnu-gpl-v2
|
|
|
|
PKG_DESTDIR_SUPPORT= user-destdir
|
|
|
|
GNU_CONFIGURE= YES
|
|
USE_GNU_READLINE= YES
|
|
ONLY_FOR_COMPILER= gcc # uses -Werror in the configure script
|
|
|
|
CONFIGURE_ARGS+= --disable-libwrap
|
|
CONFIGURE_ARGS+= --with-readline=${BUILDLINK_PREFIX.readline}
|
|
|
|
SUBST_CLASSES+= paths
|
|
SUBST_MESSAGE.paths= Fixing hardcoded paths.
|
|
SUBST_STAGE.paths= post-patch
|
|
SUBST_FILES.paths= doc/socat.1
|
|
SUBST_SED.paths= -e 's,/usr/,${PREFIX}/,g'
|
|
|
|
SUBST_CLASSES+= makefile
|
|
SUBST_MESSAGE.makefile= Fixing Makefile CCOPTS.
|
|
SUBST_STAGE.makefile= post-patch
|
|
SUBST_FILES.makefile= Makefile.in
|
|
SUBST_SED.makefile= -e '/CCOPTS/ s/-Wall -Wno-parentheses//'
|
|
|
|
.include "options.mk"
|
|
|
|
.include "../../security/openssl/buildlink3.mk"
|
|
.include "../../devel/readline/buildlink3.mk"
|
|
.include "../../mk/bsd.pkg.mk"
|