diff options
author | grant <grant@pkgsrc.org> | 2003-06-19 00:53:35 +0000 |
---|---|---|
committer | grant <grant@pkgsrc.org> | 2003-06-19 00:53:35 +0000 |
commit | 9163e52e20ef942ed24f3dda04a3386c87fabc17 (patch) | |
tree | e7277011e8f47e954432d6ca35ba40dfbfc64799 /devel | |
parent | 12d1f29d2883d952b765db774bae8d618687f799 (diff) | |
download | pkgsrc-9163e52e20ef942ed24f3dda04a3386c87fabc17.tar.gz |
Pull up revision 1.4 (requested by salo in ticket #1291):
Added fix for CAN-2003-0107 -
Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled
without vsnprintf or when long inputs are truncated using vsnprintf, allows
attackers to cause a denial of service or possibly execute arbitrary code.
From OpenBSD.
Restore configure target and add check for [v]snprintf.
Bump PKGREVISION.
Diffstat (limited to 'devel')
-rw-r--r-- | devel/zlib/distinfo | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/devel/zlib/distinfo b/devel/zlib/distinfo index fe409f75588..b6752279b86 100644 --- a/devel/zlib/distinfo +++ b/devel/zlib/distinfo @@ -1,5 +1,8 @@ -$NetBSD: distinfo,v 1.3 2002/03/12 00:25:03 wiz Exp $ +$NetBSD: distinfo,v 1.3.6.1 2003/06/19 00:53:35 grant Exp $ SHA1 (zlib-1.1.4.tar.gz) = a9d8553979956b54e887d0f090267bcec2856423 Size (zlib-1.1.4.tar.gz) = 181144 bytes +SHA1 (patch-aa) = 126697f6731e3a8e00442baea09f58a7bf70a475 SHA1 (patch-ab) = f154bd3cc566a35e4fcf28d0af849b715631f6dc +SHA1 (patch-ac) = 33449b9e949ea756627e5898f06fd39bb3355c3c +SHA1 (patch-ad) = b188a3d4cfee5899853e129bb89b3905b056fa80 |