summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorzafer <zafer@pkgsrc.org>2010-08-12 17:54:14 +0000
committerzafer <zafer@pkgsrc.org>2010-08-12 17:54:14 +0000
commit63747e270c2b0d6a94e936e66c2f3ce9fd2dc4bc (patch)
tree304f8fec6f81c20bad474565fbafe8e042bf7e5b
parent6c9238ebd7585b1f42e393cf848eeb0dc6169b00 (diff)
downloadpkgsrc-63747e270c2b0d6a94e936e66c2f3ce9fd2dc4bc.tar.gz
Update socat to 1.7.1.3
Changelog: security: fixed a stack overflow vulnerability that occurred when command line arguments (whole addresses, host names, file names) were longer than 512 bytes. Note that this could only be exploited when an attacker was able to inject data into socat's command line. Full credits to Felix Grobert, Google Security Team, for finding and reporting this issue
-rw-r--r--net/socat/Makefile4
-rw-r--r--net/socat/distinfo8
2 files changed, 6 insertions, 6 deletions
diff --git a/net/socat/Makefile b/net/socat/Makefile
index d7138aeb684..305b0531143 100644
--- a/net/socat/Makefile
+++ b/net/socat/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.23 2010/04/19 19:52:13 zafer Exp $
+# $NetBSD: Makefile,v 1.24 2010/08/12 17:54:14 zafer Exp $
-DISTNAME= socat-1.7.1.2
+DISTNAME= socat-1.7.1.3
CATEGORIES= net
MASTER_SITES= http://www.dest-unreach.org/socat/download/
diff --git a/net/socat/distinfo b/net/socat/distinfo
index 37be3d38bea..a620d5d1e0a 100644
--- a/net/socat/distinfo
+++ b/net/socat/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.14 2010/04/19 19:52:13 zafer Exp $
+$NetBSD: distinfo,v 1.15 2010/08/12 17:54:14 zafer Exp $
-SHA1 (socat-1.7.1.2.tar.gz) = dbd76e9fdac13ae95c46be9bb8a95ef4258bb466
-RMD160 (socat-1.7.1.2.tar.gz) = 2ef9b80cf5e6cc57a837c0c78e269538460aaeee
-Size (socat-1.7.1.2.tar.gz) = 554091 bytes
+SHA1 (socat-1.7.1.3.tar.gz) = 5a42275da0d8a5182452b36535a74c3cdf21793b
+RMD160 (socat-1.7.1.3.tar.gz) = fa4fdb731b5bef344f6c24a5bc242ae910728d57
+Size (socat-1.7.1.3.tar.gz) = 553489 bytes
SHA1 (patch-aa) = c10b68a5ca36ec27c6e77a01f6f89a832a4862eb