CVE reference: CAN-2005-0390 Description: A vulnerability has been reported in Axel, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error in the HTTP redirection handling. This can be exploited to cause a buffer overflow via a specially crafted response. Successful exploitation may allow execution of arbitrary code. Solution: Update to version 1.0b. http://wilmer.gaast.net/downloads/axel-1.0b.tar.gz
Dead maintainer, no metadata, no herd... dragonheart: feel like bumping ?
Bump0rd. stable on x86. CC'd archs please mark stable.
Stable on ppc.
stable on ppc64
sparc stable.
GLSA 200504-09 ppc-macos, pls mark stable to benefit from the GLSA
axel-1.0b compiles and works with and without keyword "debug" on OSX Tiger.
Stable ppc-macos.