diff options
author | Trevor Johnson <trevor@FreeBSD.org> | 2003-08-18 16:01:42 +0000 |
---|---|---|
committer | Trevor Johnson <trevor@FreeBSD.org> | 2003-08-18 16:01:42 +0000 |
commit | dfc14c855f8ec76c9bd42bc90e325a160cc5d6cf (patch) | |
tree | 9e840c1d0a062441c655e3e50be04ee840f28bad /audio/ruby-smf | |
parent | 2597df852b322ac05befaededc00ebfe2ffcab2a (diff) | |
download | ports-dfc14c855f8ec76c9bd42bc90e325a160cc5d6cf.tar.gz ports-dfc14c855f8ec76c9bd42bc90e325a160cc5d6cf.zip |
Update to 5.0.8. As reported by Paul Szabo in
<200307092234.h69MYHM43920@milan.maths.usyd.edu.au> on the
full-disclosure and bugtraq lists,
Despite recent security fixes, an exploitable buffer overflow
with long URL strings remains [in version 5.0.7]. The
overflow occurs when you click on the link, and allows
execution of arbitrary code.
Version 5.0.8 is a second attempt at correcting the problem.
Submitted by: Shiozaki Takehiko of be.to
Also remove some cruft, and add another master site. I only tested
this with linux_base-8-8.0_1.
Notes
Notes:
svn path=/head/; revision=87213
Diffstat (limited to 'audio/ruby-smf')
0 files changed, 0 insertions, 0 deletions