wok diff tiff/receipt @ rev 9544

tiff: Patched overflows that could lead to aribitrary code execution when parsing a malformed image file. Thanks slackware for having this.
author Christopher Rogers <slaxemulator@gmail.com>
date Sat Apr 09 07:21:58 2011 +0000 (2011-04-09)
parents 02bbaa9d12ba
children 85e2616a7123
line diff
     1.1 --- a/tiff/receipt	Mon Apr 04 01:29:52 2011 +0200
     1.2 +++ b/tiff/receipt	Sat Apr 09 07:21:58 2011 +0000
     1.3 @@ -20,16 +20,19 @@
     1.4      # allows context-dependent attackers to cause a denial of service 
     1.5      # (crash) via a crafted TIFF imag.
     1.6  
     1.7 -    patch -p1 -i $stuff/libtiff-CVE-2009-2285.patch
     1.8 -    ./configure --prefix=/usr --infodir=/usr/share/info \
     1.9 -    --mandir=/usr/share/man $CONFIGURE_ARGS &&
    1.10 +    patch -Np1 -i $stuff/libtiff-CVE-2009-2285.patch
    1.11 +    #http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192
    1.12 +    patch -Np1 -i $stuff/libtiff-CVE-2011-0192.patch
    1.13 +    #http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167
    1.14 +    patch -Np1 -i $stuff/libtiff-CVE-2011-1167.patch
    1.15 +    ./configure &&
    1.16      make &&
    1.17 -    make DESTDIR=$PWD/_pkg install
    1.18 +    make install
    1.19  }
    1.20  
    1.21  # Rules to gen a SliTaz package suitable for Tazpkg.
    1.22  genpkg_rules()
    1.23  {
    1.24 -	mkdir -p $fs/usr/lib
    1.25 +    mkdir -p $fs/usr/lib
    1.26      cp -a $_pkg/usr/lib/*.so* $fs/usr/lib
    1.27  }