Fix an integer overflow vulnerability, which may cause arbitrary code

to be executed.

Bump PKGREVISION to nb2.
This commit is contained in:
uebayasi 2002-12-31 02:31:53 +00:00
parent 634d85f39f
commit 9891ea0a33
3 changed files with 11 additions and 4 deletions

View file

@ -1,4 +1,4 @@
$NetBSD: CHANGES,v 1.950 2002/12/30 22:00:30 kristerw Exp $
$NetBSD: CHANGES,v 1.951 2002/12/31 02:33:26 uebayasi Exp $
Changes to the packages collection and infrastructure in 2002:
@ -4320,3 +4320,4 @@ Changes to the packages collection and infrastructure in 2002:
Updated sylpheed-claws to 0.8.8nb1 [chris 2002-12-30]
Updated gmp3info to 0.8.4 [tron 2002-12-30]
Updated snes9x to 1.39nb2 [kristerw 2002-12-30]
Updated xpdf to 2.0.1nb2 [uebayasi 2002-12-31]

View file

@ -1,12 +1,16 @@
# $NetBSD: Makefile,v 1.14 2002/12/24 06:10:24 wiz Exp $
# $NetBSD: Makefile,v 1.15 2002/12/31 02:31:53 uebayasi Exp $
#
DISTNAME= xpdf-2.01
PKGREVISION= 1
PKGREVISION= 2
CATEGORIES= print
MASTER_SITES= ftp://ftp.foolabs.com/pub/xpdf/ \
${MASTER_SITE_SUNSITE:=apps/graphics/viewers/X/}
PATCH_SITES= ftp://ftp.foolabs.com/pub/xpdf/
PATCHFILES= xpdf-2.01-patch1
PATCH_DIST_ARGS=-d ${WRKSRC}/xpdf
MAINTAINER= packages@netbsd.org
HOMEPAGE= http://www.foolabs.com/xpdf/
COMMENT= Display tool for PDF files

View file

@ -1,6 +1,8 @@
$NetBSD: distinfo,v 1.9 2002/12/07 17:49:43 drochner Exp $
$NetBSD: distinfo,v 1.10 2002/12/31 02:31:54 uebayasi Exp $
SHA1 (xpdf-2.01.tar.gz) = 9c5633b937496bad9ef14031713e6c45b68b066c
Size (xpdf-2.01.tar.gz) = 465004 bytes
SHA1 (xpdf-2.01-patch1) = 031ceb5595ce5f07bc4c6081e46214ef0aea5a9d
Size (xpdf-2.01-patch1) = 1038 bytes
SHA1 (patch-aa) = bf57c8955a25fc723fdcc86acc2055876c39a686
SHA1 (patch-ab) = e0e7bca53918c125db5dcece7153afbec6e089ce