wok diff tiff/receipt @ rev 9544
tiff: Patched overflows that could lead to aribitrary code execution when parsing a malformed image file. Thanks slackware for having this.
author | Christopher Rogers <slaxemulator@gmail.com> |
---|---|
date | Sat Apr 09 07:21:58 2011 +0000 (2011-04-09) |
parents | 02bbaa9d12ba |
children | 85e2616a7123 |
line diff
1.1 --- a/tiff/receipt Mon Apr 04 01:29:52 2011 +0200 1.2 +++ b/tiff/receipt Sat Apr 09 07:21:58 2011 +0000 1.3 @@ -20,16 +20,19 @@ 1.4 # allows context-dependent attackers to cause a denial of service 1.5 # (crash) via a crafted TIFF imag. 1.6 1.7 - patch -p1 -i $stuff/libtiff-CVE-2009-2285.patch 1.8 - ./configure --prefix=/usr --infodir=/usr/share/info \ 1.9 - --mandir=/usr/share/man $CONFIGURE_ARGS && 1.10 + patch -Np1 -i $stuff/libtiff-CVE-2009-2285.patch 1.11 + #http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192 1.12 + patch -Np1 -i $stuff/libtiff-CVE-2011-0192.patch 1.13 + #http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167 1.14 + patch -Np1 -i $stuff/libtiff-CVE-2011-1167.patch 1.15 + ./configure && 1.16 make && 1.17 - make DESTDIR=$PWD/_pkg install 1.18 + make install 1.19 } 1.20 1.21 # Rules to gen a SliTaz package suitable for Tazpkg. 1.22 genpkg_rules() 1.23 { 1.24 - mkdir -p $fs/usr/lib 1.25 + mkdir -p $fs/usr/lib 1.26 cp -a $_pkg/usr/lib/*.so* $fs/usr/lib 1.27 }