upgrade to xpdf 2.02pl1
fixes a flaw where an attacker can embed malicious hyperlinks that if activated can execute arbitrary shell commands. http://marc.theaimsgroup.com/?l=full-disclosure&m=105555332025253&w=2
This commit is contained in:
parent
c336bbc9ca
commit
92fc00317d
@ -1,8 +1,8 @@
|
||||
# $OpenBSD: Makefile,v 1.33 2003/05/20 00:37:10 brad Exp $
|
||||
# $OpenBSD: Makefile,v 1.34 2003/06/19 12:00:47 brad Exp $
|
||||
|
||||
COMMENT= "PDF viewer for X"
|
||||
|
||||
DISTNAME= xpdf-2.02
|
||||
DISTNAME= xpdf-2.02pl1
|
||||
CATEGORIES= textproc x11
|
||||
|
||||
MASTER_SITES= ftp://ftp.foolabs.com/pub/xpdf/
|
||||
|
@ -1,3 +1,3 @@
|
||||
MD5 (xpdf-2.02.tar.gz) = fb54402d98fb834e5778163cfc238b44
|
||||
RMD160 (xpdf-2.02.tar.gz) = 24136006e26916358ef93fdcda792f40335629ad
|
||||
SHA1 (xpdf-2.02.tar.gz) = 482b6a33addc50fd1ec73f676b4db74a17d4dd75
|
||||
MD5 (xpdf-2.02pl1.tar.gz) = e2932bb0f844d8318c940350c2aa2eb6
|
||||
RMD160 (xpdf-2.02pl1.tar.gz) = e7a9c6a7bca3134ac27355d92aed6ca8d47e5a7f
|
||||
SHA1 (xpdf-2.02pl1.tar.gz) = a8b482e49027c6166f7399b8d5f412ddcaef2eb3
|
||||
|
Loading…
Reference in New Issue
Block a user