Update to version 0.98

--
This version fixes an URL CRLF Injection Vulnerability:
 A CRLF injection vulnerability has been reported for Links that
 may allow an attacker to include extra HTTP headers when viewing
 web pages.
 If Links is called from the command line, carriage return and line
 feed (CRLF) characters may be included in the specified URL.
 These characters are not escaped when the input is used to construct
 a HTTP request.

URL: http://online.securityfocus.com/bid/5499/discussion/

espie@ brad@ ok
This commit is contained in:
margarida 2002-12-03 00:01:19 +00:00
parent c30d3e91ce
commit 67377a7b7f
2 changed files with 9 additions and 7 deletions

View File

@ -1,10 +1,10 @@
# $OpenBSD: Makefile,v 1.7 2001/07/10 22:51:49 lebel Exp $
# $OpenBSD: Makefile,v 1.8 2002/12/03 00:01:19 margarida Exp $
COMMENT= "text browser, displays while downloading"
DISTNAME= links-0.96
VERSION= 0.98
DISTNAME= links-${VERSION}
CATEGORIES= www
NEED_VERSION= 1.402
HOMEPAGE= http://artax.karlin.mff.cuni.cz/%7Emikulas/links/
MAINTAINER= Marc Espie <espie@openbsd.org>
@ -15,7 +15,9 @@ PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
MASTER_SITES= http://artax.karlin.mff.cuni.cz/%7Emikulas/links/download/
MASTER_SITES= http://artax.karlin.mff.cuni.cz/%7Emikulas/links/download/ \
http://links.sourceforge.net/download/
CONFIGURE_STYLE= gnu
.include <bsd.port.mk>

View File

@ -1,3 +1,3 @@
MD5 (links-0.96.tar.gz) = 1c3502f3a3a5b79312cd296fb3d60544
RMD160 (links-0.96.tar.gz) = d1dfc38d66f56e6f1143df9b4ed98c02a1c7dce0
SHA1 (links-0.96.tar.gz) = 4d160bf58ff1491aa19897c49504294912aa9cdb
MD5 (links-0.98.tar.gz) = c411e8f85e959408d6c0182045bd7b62
RMD160 (links-0.98.tar.gz) = db9a18803145e6f997041fcedb9fe48977e9c57c
SHA1 (links-0.98.tar.gz) = c50fcc75c797e0a9a643944c6b5cb9fb8d41dcb6