openbsd-ports/www/links+/distinfo
sthen 0dde427829 Security update to links 2.6, fixes include:
- Buffer overflow when pasting too long text from clipboard to dialog
boxes (not remotely exploitable)
- A write out of allocated memory in the graphics renderer
(potentially exploitable)
- An infinite loop when parsing invalid usemap specification in text and
graphics mode (can cause browser lockup, but not otherwise exploitable)
- Accesses out of memory in the xbm decoder (potentially exploitable)

Also drop dip.c patch to resolve crashes with libpng 1.5, upstream
appears to have fixed this separately in the update to 2.5.
Thanks jasper@ for additional testing.
2012-04-10 11:59:44 +00:00

6 lines
269 B
Plaintext

MD5 (links-2.6.tar.gz) = hKHRS1E6fsnoDx+TjHHjjQ==
RMD160 (links-2.6.tar.gz) = in1t91BFmVNBoGj5glqp4mT4R4I=
SHA1 (links-2.6.tar.gz) = tOcDEaxVfbuS4vyHpM0b9GjcyZM=
SHA256 (links-2.6.tar.gz) = xyBhOAT7HL+fU7z/pKshn/I/MBXfCgiGS8D9KZDLvjk=
SIZE (links-2.6.tar.gz) = 4248788