aboutsummaryrefslogtreecommitdiffstats
path: root/ftp
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2003-12-13 00:48:47 +0800
committernectar <nectar@FreeBSD.org>2003-12-13 00:48:47 +0800
commit2800a57204974d5844fff54b2efe65f7b62a38ff (patch)
treedadba7feae1bc123386fd4ef9b6b3d8ea35fc16c /ftp
parentfc4c485eefde7d38fc137f9e9ee6fd5b84e892ac (diff)
downloadfreebsd-ports-gnome-2800a57204974d5844fff54b2efe65f7b62a38ff.tar.gz
freebsd-ports-gnome-2800a57204974d5844fff54b2efe65f7b62a38ff.tar.zst
freebsd-ports-gnome-2800a57204974d5844fff54b2efe65f7b62a38ff.zip
A buffer overflow exists in lftp <= 2.6.9 which may be triggered when
requesting a directory listing from a malicious server over HTTP. From the `NEWS' file: * security fixes in html parsing code
Diffstat (limited to 'ftp')
-rw-r--r--ftp/lftp/Makefile2
-rw-r--r--ftp/lftp/distinfo2
2 files changed, 2 insertions, 2 deletions
diff --git a/ftp/lftp/Makefile b/ftp/lftp/Makefile
index 095d309a3648..c8ffe6e9d458 100644
--- a/ftp/lftp/Makefile
+++ b/ftp/lftp/Makefile
@@ -6,7 +6,7 @@
#
PORTNAME= lftp
-PORTVERSION= 2.6.9
+PORTVERSION= 2.6.10
CATEGORIES= ftp ipv6
MASTER_SITES= ftp://ftp.phear.org/pub/linux/networking/ftp/client/lftp/ \
ftp://ftp.phear.org/pub/linux/networking/ftp/client/lftp/old/ \
diff --git a/ftp/lftp/distinfo b/ftp/lftp/distinfo
index e665cf294ff7..3f2295a60b8a 100644
--- a/ftp/lftp/distinfo
+++ b/ftp/lftp/distinfo
@@ -1 +1 @@
-MD5 (lftp-2.6.9.tar.bz2) = 34ae6b74b003e99ccae4dd82122192ed
+MD5 (lftp-2.6.10.tar.bz2) = 851387ab94bad8013d20ba7d3758b603