diff options
author | spz <spz@pkgsrc.org> | 2014-09-29 11:36:01 +0000 |
---|---|---|
committer | spz <spz@pkgsrc.org> | 2014-09-29 11:36:01 +0000 |
commit | a507b191fde09a98153452c11051728f526e2e6b (patch) | |
tree | ad2ec8ec77ad7bc61a9d1888259ad325ed0e77c9 /lang/perl5/distinfo | |
parent | b9538ec294580d2e9e5a195a2849ed9feea07d89 (diff) | |
download | pkgsrc-a507b191fde09a98153452c11051728f526e2e6b.tar.gz |
Minimally invasive fix for CVE-2014-4330, also known as
https://www.lsexperts.de/advisories/lse-2014-06-10.txt,
a stack overflow vulnerability in Data::Dumper
Patches taken from
http://perl5.git.perl.org/perl.git/commitdiff/19be3be6968e2337bcdfe480693fff795ecd1304,
to be removed when updating to 5.20.1 (or later).
perl-5.20.0nb2 is fit for pkg_add -u replacement of perl-5.20.0nb1
Diffstat (limited to 'lang/perl5/distinfo')
-rw-r--r-- | lang/perl5/distinfo | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/lang/perl5/distinfo b/lang/perl5/distinfo index 39783ac4bd2..88f9d050a8f 100644 --- a/lang/perl5/distinfo +++ b/lang/perl5/distinfo @@ -1,4 +1,4 @@ -$NetBSD: distinfo,v 1.122 2014/08/12 05:41:39 mrg Exp $ +$NetBSD: distinfo,v 1.123 2014/09/29 11:36:01 spz Exp $ SHA1 (perl-5.20.0.tar.bz2) = e925e4fc36e90eace19a1ca850f912618ba6788f RMD160 (perl-5.20.0.tar.bz2) = a14fa854f2d50aa5f16ff3a982244dd6cd0c4730 @@ -14,6 +14,8 @@ SHA1 (patch-ch) = 5b6a89c82e158bab0a5f06add48c28e600678099 SHA1 (patch-ck) = 5c381db130cdf4c315678e2d65380eaaa3065fee SHA1 (patch-cn) = d1877383e213a414562b5bb4c1e8aa785926fab7 SHA1 (patch-cpan_Socket_Socket.xs) = 9390c42ad456b0ea114c2e57e4d829d630fb698e +SHA1 (patch-dist_Data-Dumper_Dumper.pm) = 27f9bb4084aa0b21b05bd10d850942b978f7f821 +SHA1 (patch-dist_Data-Dumper_Dumper.xs) = 2e3384973a70b46f8f9ed72c0e9966e00fcbd8af SHA1 (patch-ext_Errno_Errno__pm.PL) = 4f135e267da17de38f8f1e7e03d5209bfd09a323 SHA1 (patch-hints_cygwin.sh) = 1b21d927d6b7379754c4cd64a2b05d3632c35470 SHA1 (patch-hints_darwin.sh) = c561d1862f8ca76652a35741c691394eb8cda70a |