K 10 svn:author V 6 trevor K 8 svn:date V 27 2003-08-18T16:01:42.000000Z K 7 svn:log V 550 Update to 5.0.8. As reported by Paul Szabo in <200307092234.h69MYHM43920@milan.maths.usyd.edu.au> on the full-disclosure and bugtraq lists, Despite recent security fixes, an exploitable buffer overflow with long URL strings remains [in version 5.0.7]. The overflow occurs when you click on the link, and allows execution of arbitrary code. Version 5.0.8 is a second attempt at correcting the problem. Submitted by: Shiozaki Takehiko of be.to Also remove some cruft, and add another master site. I only tested this with linux_base-8-8.0_1. END