Update to version 0.98
-- This version fixes an URL CRLF Injection Vulnerability: A CRLF injection vulnerability has been reported for Links that may allow an attacker to include extra HTTP headers when viewing web pages. If Links is called from the command line, carriage return and line feed (CRLF) characters may be included in the specified URL. These characters are not escaped when the input is used to construct a HTTP request. URL: http://online.securityfocus.com/bid/5499/discussion/ espie@ brad@ ok
This commit is contained in:
parent
c30d3e91ce
commit
67377a7b7f
@ -1,10 +1,10 @@
|
||||
# $OpenBSD: Makefile,v 1.7 2001/07/10 22:51:49 lebel Exp $
|
||||
# $OpenBSD: Makefile,v 1.8 2002/12/03 00:01:19 margarida Exp $
|
||||
|
||||
COMMENT= "text browser, displays while downloading"
|
||||
|
||||
DISTNAME= links-0.96
|
||||
VERSION= 0.98
|
||||
DISTNAME= links-${VERSION}
|
||||
CATEGORIES= www
|
||||
NEED_VERSION= 1.402
|
||||
|
||||
HOMEPAGE= http://artax.karlin.mff.cuni.cz/%7Emikulas/links/
|
||||
MAINTAINER= Marc Espie <espie@openbsd.org>
|
||||
@ -15,7 +15,9 @@ PERMIT_PACKAGE_FTP= Yes
|
||||
PERMIT_DISTFILES_CDROM= Yes
|
||||
PERMIT_DISTFILES_FTP= Yes
|
||||
|
||||
MASTER_SITES= http://artax.karlin.mff.cuni.cz/%7Emikulas/links/download/
|
||||
MASTER_SITES= http://artax.karlin.mff.cuni.cz/%7Emikulas/links/download/ \
|
||||
http://links.sourceforge.net/download/
|
||||
|
||||
CONFIGURE_STYLE= gnu
|
||||
|
||||
.include <bsd.port.mk>
|
||||
|
@ -1,3 +1,3 @@
|
||||
MD5 (links-0.96.tar.gz) = 1c3502f3a3a5b79312cd296fb3d60544
|
||||
RMD160 (links-0.96.tar.gz) = d1dfc38d66f56e6f1143df9b4ed98c02a1c7dce0
|
||||
SHA1 (links-0.96.tar.gz) = 4d160bf58ff1491aa19897c49504294912aa9cdb
|
||||
MD5 (links-0.98.tar.gz) = c411e8f85e959408d6c0182045bd7b62
|
||||
RMD160 (links-0.98.tar.gz) = db9a18803145e6f997041fcedb9fe48977e9c57c
|
||||
SHA1 (links-0.98.tar.gz) = c50fcc75c797e0a9a643944c6b5cb9fb8d41dcb6
|
||||
|
Loading…
Reference in New Issue
Block a user