summaryrefslogtreecommitdiff
path: root/graphics/gd
diff options
context:
space:
mode:
authorTrevor Johnson <trevor@FreeBSD.org>2003-08-18 16:01:42 +0000
committerTrevor Johnson <trevor@FreeBSD.org>2003-08-18 16:01:42 +0000
commitdfc14c855f8ec76c9bd42bc90e325a160cc5d6cf (patch)
tree9e840c1d0a062441c655e3e50be04ee840f28bad /graphics/gd
parentbackout 2.1.0 update, and downgrade it to 2.0.0. (diff)
Update to 5.0.8. As reported by Paul Szabo in
<200307092234.h69MYHM43920@milan.maths.usyd.edu.au> on the full-disclosure and bugtraq lists, Despite recent security fixes, an exploitable buffer overflow with long URL strings remains [in version 5.0.7]. The overflow occurs when you click on the link, and allows execution of arbitrary code. Version 5.0.8 is a second attempt at correcting the problem. Submitted by: Shiozaki Takehiko of be.to Also remove some cruft, and add another master site. I only tested this with linux_base-8-8.0_1.
Notes
Notes: svn path=/head/; revision=87213
Diffstat (limited to 'graphics/gd')
0 files changed, 0 insertions, 0 deletions