Bug 59939 - [patch] Update port: www/nd to 0.8.2
Summary: [patch] Update port: www/nd to 0.8.2
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: freebsd-ports-bugs (Nobody)
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2003-12-04 08:40 UTC by stolz
Modified: 2003-12-04 21:57 UTC (History)
0 users

See Also:


Attachments
nd (722 bytes, text/plain)
2003-12-04 08:40 UTC, stolz
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description stolz 2003-12-04 08:40:05 UTC
Update to 0.8.2:
- Avoid buffer overflows: "nd version 0.8.1 or earlier has a vulnerability of buffer overflow caused by a long urls, authentication realm, lock-token etc. This allows remote attackers to execute arbitrary code on the host running this command. Please use 0.8.2 or later."
- Support properties which have namespace other than DAV:.
- More options.
Comment 1 Pav Lucistnik freebsd_committer freebsd_triage 2003-12-04 21:57:29 UTC
State Changed
From-To: open->closed

Committed, thanks!