freebsd-ports/print/acroread5/distinfo
Trevor Johnson dfc14c855f Update to 5.0.8. As reported by Paul Szabo in
<200307092234.h69MYHM43920@milan.maths.usyd.edu.au> on the
full-disclosure and bugtraq lists,

	Despite recent security fixes, an exploitable buffer overflow
	with long URL strings remains [in version 5.0.7]. The
	overflow occurs when you click on the link, and allows
	execution of arbitrary code.

Version 5.0.8 is a second attempt at correcting the problem.

Submitted by:  Shiozaki Takehiko of be.to

Also remove some cruft, and add another master site.  I only tested
this with linux_base-8-8.0_1.
2003-08-18 16:01:42 +00:00

1 line
67 B
Text

MD5 (acroread/linux-508.tar.gz) = fbf4e174be41987addacca7cf677dd58