upgrade to xpdf 2.02pl1

fixes a flaw where an attacker can embed malicious hyperlinks that if
activated can execute arbitrary shell commands.

http://marc.theaimsgroup.com/?l=full-disclosure&m=105555332025253&w=2
This commit is contained in:
brad 2003-06-19 12:00:47 +00:00
parent c336bbc9ca
commit 92fc00317d
2 changed files with 5 additions and 5 deletions

View File

@ -1,8 +1,8 @@
# $OpenBSD: Makefile,v 1.33 2003/05/20 00:37:10 brad Exp $
# $OpenBSD: Makefile,v 1.34 2003/06/19 12:00:47 brad Exp $
COMMENT= "PDF viewer for X"
DISTNAME= xpdf-2.02
DISTNAME= xpdf-2.02pl1
CATEGORIES= textproc x11
MASTER_SITES= ftp://ftp.foolabs.com/pub/xpdf/

View File

@ -1,3 +1,3 @@
MD5 (xpdf-2.02.tar.gz) = fb54402d98fb834e5778163cfc238b44
RMD160 (xpdf-2.02.tar.gz) = 24136006e26916358ef93fdcda792f40335629ad
SHA1 (xpdf-2.02.tar.gz) = 482b6a33addc50fd1ec73f676b4db74a17d4dd75
MD5 (xpdf-2.02pl1.tar.gz) = e2932bb0f844d8318c940350c2aa2eb6
RMD160 (xpdf-2.02pl1.tar.gz) = e7a9c6a7bca3134ac27355d92aed6ca8d47e5a7f
SHA1 (xpdf-2.02pl1.tar.gz) = a8b482e49027c6166f7399b8d5f412ddcaef2eb3