mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-24 09:25:01 +00:00
Update to 5.0.8. As reported by Paul Szabo in
<200307092234.h69MYHM43920@milan.maths.usyd.edu.au> on the full-disclosure and bugtraq lists, Despite recent security fixes, an exploitable buffer overflow with long URL strings remains [in version 5.0.7]. The overflow occurs when you click on the link, and allows execution of arbitrary code. Version 5.0.8 is a second attempt at correcting the problem. Submitted by: Shiozaki Takehiko of be.to Also remove some cruft, and add another master site. I only tested this with linux_base-8-8.0_1.
This commit is contained in:
parent
2597df852b
commit
dfc14c855f
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=87213
@ -6,13 +6,13 @@
|
||||
#
|
||||
|
||||
PORTNAME= acroread
|
||||
PORTVERSION= 5.07
|
||||
#PORTREVISION= 1
|
||||
PORTVERSION= 5.08
|
||||
CATEGORIES= print linux
|
||||
MASTER_SITES= ftp://ftp.adobe.com/pub/adobe/acrobatreader/unix/5.x/
|
||||
MASTER_SITES= http://download.adobe.com/pub/adobe/acrobatreader/unix/5.x/ \
|
||||
ftp://ftp.adobe.com/pub/adobe/acrobatreader/unix/5.x/
|
||||
.include <bsd.port.pre.mk>
|
||||
.if ${ARCH} == "i386"
|
||||
DISTNAME= linux-507
|
||||
DISTNAME= linux-508
|
||||
.endif
|
||||
DIST_SUBDIR= acroread
|
||||
|
||||
|
@ -1 +1 @@
|
||||
MD5 (acroread/linux-507.tar.gz) = 25f0ab387ebed3bf63ca24962ffcf9fa
|
||||
MD5 (acroread/linux-508.tar.gz) = fbf4e174be41987addacca7cf677dd58
|
||||
|
Loading…
Reference in New Issue
Block a user