summaryrefslogtreecommitdiff
path: root/graphics/tiff/buildlink3.mk
diff options
context:
space:
mode:
authorreed <reed>2004-12-22 03:57:15 +0000
committerreed <reed>2004-12-22 03:57:15 +0000
commit030dfceb16b1949884e92cc8450e13f386c29881 (patch)
tree4c9624a27be2a06706acb701a3ead726ce327754 /graphics/tiff/buildlink3.mk
parentcb65ded51c17646030da1a6a2bed64340305704c (diff)
downloadpkgsrc-030dfceb16b1949884e92cc8450e13f386c29881.tar.gz
patch-ag and patch-ao already had security fixes for CESA-2004-006.
But now these are improved in response to iDEFENSE Security Advisory 12.21.04 www.idefense.com/application/poi/display?id=173&type=vulnerabilities libtiff STRIPOFFSETS Integer Overflow Vulnerability December 21, 2004 This fix (in two files) was from that advisory and also seen in tiff 3.7.1. PKGREVISION is bumped to 6 and BUILDLINK_RECOMMENDED is adjusted for this possible security issue. Other packages depending on this are not bumped.
Diffstat (limited to 'graphics/tiff/buildlink3.mk')
-rw-r--r--graphics/tiff/buildlink3.mk4
1 files changed, 2 insertions, 2 deletions
diff --git a/graphics/tiff/buildlink3.mk b/graphics/tiff/buildlink3.mk
index 939c4c68827..43499428038 100644
--- a/graphics/tiff/buildlink3.mk
+++ b/graphics/tiff/buildlink3.mk
@@ -1,4 +1,4 @@
-# $NetBSD: buildlink3.mk,v 1.8 2004/10/03 00:14:58 tv Exp $
+# $NetBSD: buildlink3.mk,v 1.9 2004/12/22 03:57:15 reed Exp $
BUILDLINK_DEPTH:= ${BUILDLINK_DEPTH}+
TIFF_BUILDLINK3_MK:= ${TIFF_BUILDLINK3_MK}+
@@ -12,7 +12,7 @@ BUILDLINK_PACKAGES+= tiff
.if !empty(TIFF_BUILDLINK3_MK:M+)
BUILDLINK_DEPENDS.tiff+= tiff>=3.6.1
-BUILDLINK_RECOMMENDED.tiff+= tiff>=3.6.1nb3
+BUILDLINK_RECOMMENDED.tiff+= tiff>=3.6.1nb6
BUILDLINK_PKGSRCDIR.tiff?= ../../graphics/tiff
.endif # TIFF_BUILDLINK3_MK