mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-11 02:50:24 +00:00
dfc14c855f
<200307092234.h69MYHM43920@milan.maths.usyd.edu.au> on the full-disclosure and bugtraq lists, Despite recent security fixes, an exploitable buffer overflow with long URL strings remains [in version 5.0.7]. The overflow occurs when you click on the link, and allows execution of arbitrary code. Version 5.0.8 is a second attempt at correcting the problem. Submitted by: Shiozaki Takehiko of be.to Also remove some cruft, and add another master site. I only tested this with linux_base-8-8.0_1.
2 lines
67 B
Plaintext
2 lines
67 B
Plaintext
MD5 (acroread/linux-508.tar.gz) = fbf4e174be41987addacca7cf677dd58
|