diff options
author | zafer <zafer@pkgsrc.org> | 2010-08-12 17:54:14 +0000 |
---|---|---|
committer | zafer <zafer@pkgsrc.org> | 2010-08-12 17:54:14 +0000 |
commit | 63747e270c2b0d6a94e936e66c2f3ce9fd2dc4bc (patch) | |
tree | 304f8fec6f81c20bad474565fbafe8e042bf7e5b | |
parent | 6c9238ebd7585b1f42e393cf848eeb0dc6169b00 (diff) | |
download | pkgsrc-63747e270c2b0d6a94e936e66c2f3ce9fd2dc4bc.tar.gz |
Update socat to 1.7.1.3
Changelog:
security:
fixed a stack overflow vulnerability that occurred when command
line arguments (whole addresses, host names, file names) were longer
than 512 bytes.
Note that this could only be exploited when an attacker was able to
inject data into socat's command line.
Full credits to Felix Grobert, Google Security Team, for finding and
reporting this issue
-rw-r--r-- | net/socat/Makefile | 4 | ||||
-rw-r--r-- | net/socat/distinfo | 8 |
2 files changed, 6 insertions, 6 deletions
diff --git a/net/socat/Makefile b/net/socat/Makefile index d7138aeb684..305b0531143 100644 --- a/net/socat/Makefile +++ b/net/socat/Makefile @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.23 2010/04/19 19:52:13 zafer Exp $ +# $NetBSD: Makefile,v 1.24 2010/08/12 17:54:14 zafer Exp $ -DISTNAME= socat-1.7.1.2 +DISTNAME= socat-1.7.1.3 CATEGORIES= net MASTER_SITES= http://www.dest-unreach.org/socat/download/ diff --git a/net/socat/distinfo b/net/socat/distinfo index 37be3d38bea..a620d5d1e0a 100644 --- a/net/socat/distinfo +++ b/net/socat/distinfo @@ -1,6 +1,6 @@ -$NetBSD: distinfo,v 1.14 2010/04/19 19:52:13 zafer Exp $ +$NetBSD: distinfo,v 1.15 2010/08/12 17:54:14 zafer Exp $ -SHA1 (socat-1.7.1.2.tar.gz) = dbd76e9fdac13ae95c46be9bb8a95ef4258bb466 -RMD160 (socat-1.7.1.2.tar.gz) = 2ef9b80cf5e6cc57a837c0c78e269538460aaeee -Size (socat-1.7.1.2.tar.gz) = 554091 bytes +SHA1 (socat-1.7.1.3.tar.gz) = 5a42275da0d8a5182452b36535a74c3cdf21793b +RMD160 (socat-1.7.1.3.tar.gz) = fa4fdb731b5bef344f6c24a5bc242ae910728d57 +Size (socat-1.7.1.3.tar.gz) = 553489 bytes SHA1 (patch-aa) = c10b68a5ca36ec27c6e77a01f6f89a832a4862eb |