Update to 5.0.8. As reported by Paul Szabo in

<200307092234.h69MYHM43920@milan.maths.usyd.edu.au> on the
full-disclosure and bugtraq lists,

	Despite recent security fixes, an exploitable buffer overflow
	with long URL strings remains [in version 5.0.7]. The
	overflow occurs when you click on the link, and allows
	execution of arbitrary code.

Version 5.0.8 is a second attempt at correcting the problem.

Submitted by:  Shiozaki Takehiko of be.to

Also remove some cruft, and add another master site.  I only tested
this with linux_base-8-8.0_1.
This commit is contained in:
Trevor Johnson 2003-08-18 16:01:42 +00:00
parent 2597df852b
commit dfc14c855f
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=87213
2 changed files with 5 additions and 5 deletions

View File

@ -6,13 +6,13 @@
#
PORTNAME= acroread
PORTVERSION= 5.07
#PORTREVISION= 1
PORTVERSION= 5.08
CATEGORIES= print linux
MASTER_SITES= ftp://ftp.adobe.com/pub/adobe/acrobatreader/unix/5.x/
MASTER_SITES= http://download.adobe.com/pub/adobe/acrobatreader/unix/5.x/ \
ftp://ftp.adobe.com/pub/adobe/acrobatreader/unix/5.x/
.include <bsd.port.pre.mk>
.if ${ARCH} == "i386"
DISTNAME= linux-507
DISTNAME= linux-508
.endif
DIST_SUBDIR= acroread

View File

@ -1 +1 @@
MD5 (acroread/linux-507.tar.gz) = 25f0ab387ebed3bf63ca24962ffcf9fa
MD5 (acroread/linux-508.tar.gz) = fbf4e174be41987addacca7cf677dd58