ports/53479: [Update] ports/print/acroread5 (includes security fix)
Hideyuki KURASHINA
rushani at bl.mmtr.or.jp
Thu Jun 19 06:10:20 UTC 2003
>Number: 53479
>Category: ports
>Synopsis: [Update] ports/print/acroread5 (includes security fix)
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Wed Jun 18 23:10:15 PDT 2003
>Closed-Date:
>Last-Modified:
>Originator: Hideyuki KURASHINA
>Release: FreeBSD 4.8-STABLE i386
>Organization:
>Environment:
System: FreeBSD *******.ac.jp 4.8-STABLE FreeBSD 4.8-STABLE #0: Wed Jun 18 14:24:07
>Description:
According to the
Adobe Systems Incorporated Information for VU#200132
http://www.kb.cert.org/vuls/id/IAFY-5MCQ4L
CERT/CC Vulnerability Note VU#200132
http://www.kb.cert.org/vuls/id/200132
Acrobat Reader before 5.0.7 has a vulnerability that may
allow remote attackers to execute arbitrary commands on a
target system.
>How-To-Repeat:
>Fix:
Apply followng patch;
diff -urN ./acroread5.0.6/Makefile ./acroread5/Makefile
--- ./acroread5.0.6/Makefile Sun Mar 2 18:05:30 2003
+++ ./acroread5/Makefile Thu Jun 19 14:43:41 2003
@@ -6,13 +6,12 @@
#
PORTNAME= acroread
-PORTVERSION= 5.06
-PORTREVISION= 1
+PORTVERSION= 5.07
CATEGORIES= print linux
MASTER_SITES= ftp://ftp.adobe.com/pub/adobe/acrobatreader/unix/5.x/
.include <bsd.port.pre.mk>
.if ${ARCH} == "i386"
-DISTNAME= linux-506
+DISTNAME= linux-507
.endif
DIST_SUBDIR= acroread
diff -urN ./acroread5.0.6/distinfo ./acroread5/distinfo
--- ./acroread5.0.6/distinfo Fri Jul 26 17:03:16 2002
+++ ./acroread5/distinfo Thu Jun 19 14:43:42 2003
@@ -1 +1 @@
-MD5 (acroread/linux-506.tar.gz) = c5ca1f2fac7f2530d85de18ee6fffc26
+MD5 (acroread/linux-507.tar.gz) = 25f0ab387ebed3bf63ca24962ffcf9fa
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list