aboutsummaryrefslogtreecommitdiff
path: root/audio/ruby-smf
diff options
context:
space:
mode:
authorTrevor Johnson <trevor@FreeBSD.org>2003-08-18 16:01:42 +0000
committerTrevor Johnson <trevor@FreeBSD.org>2003-08-18 16:01:42 +0000
commitdfc14c855f8ec76c9bd42bc90e325a160cc5d6cf (patch)
tree9e840c1d0a062441c655e3e50be04ee840f28bad /audio/ruby-smf
parent2597df852b322ac05befaededc00ebfe2ffcab2a (diff)
downloadports-dfc14c855f8ec76c9bd42bc90e325a160cc5d6cf.tar.gz
ports-dfc14c855f8ec76c9bd42bc90e325a160cc5d6cf.zip
Update to 5.0.8. As reported by Paul Szabo in
<200307092234.h69MYHM43920@milan.maths.usyd.edu.au> on the full-disclosure and bugtraq lists, Despite recent security fixes, an exploitable buffer overflow with long URL strings remains [in version 5.0.7]. The overflow occurs when you click on the link, and allows execution of arbitrary code. Version 5.0.8 is a second attempt at correcting the problem. Submitted by: Shiozaki Takehiko of be.to Also remove some cruft, and add another master site. I only tested this with linux_base-8-8.0_1.
Notes
Notes: svn path=/head/; revision=87213
Diffstat (limited to 'audio/ruby-smf')
0 files changed, 0 insertions, 0 deletions