summaryrefslogtreecommitdiff
path: root/net
diff options
context:
space:
mode:
authorzafer <zafer>2010-08-12 17:54:14 +0000
committerzafer <zafer>2010-08-12 17:54:14 +0000
commit7bdf9ee7d21cf124db17b18ebb3d2cea30aadedc (patch)
tree304f8fec6f81c20bad474565fbafe8e042bf7e5b /net
parent8db102c0a025c5e74c8c0296e64d4bb7328c0919 (diff)
downloadpkgsrc-7bdf9ee7d21cf124db17b18ebb3d2cea30aadedc.tar.gz
Update socat to 1.7.1.3
Changelog: security: fixed a stack overflow vulnerability that occurred when command line arguments (whole addresses, host names, file names) were longer than 512 bytes. Note that this could only be exploited when an attacker was able to inject data into socat's command line. Full credits to Felix Grobert, Google Security Team, for finding and reporting this issue
Diffstat (limited to 'net')
-rw-r--r--net/socat/Makefile4
-rw-r--r--net/socat/distinfo8
2 files changed, 6 insertions, 6 deletions
diff --git a/net/socat/Makefile b/net/socat/Makefile
index d7138aeb684..305b0531143 100644
--- a/net/socat/Makefile
+++ b/net/socat/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.23 2010/04/19 19:52:13 zafer Exp $
+# $NetBSD: Makefile,v 1.24 2010/08/12 17:54:14 zafer Exp $
-DISTNAME= socat-1.7.1.2
+DISTNAME= socat-1.7.1.3
CATEGORIES= net
MASTER_SITES= http://www.dest-unreach.org/socat/download/
diff --git a/net/socat/distinfo b/net/socat/distinfo
index 37be3d38bea..a620d5d1e0a 100644
--- a/net/socat/distinfo
+++ b/net/socat/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.14 2010/04/19 19:52:13 zafer Exp $
+$NetBSD: distinfo,v 1.15 2010/08/12 17:54:14 zafer Exp $
-SHA1 (socat-1.7.1.2.tar.gz) = dbd76e9fdac13ae95c46be9bb8a95ef4258bb466
-RMD160 (socat-1.7.1.2.tar.gz) = 2ef9b80cf5e6cc57a837c0c78e269538460aaeee
-Size (socat-1.7.1.2.tar.gz) = 554091 bytes
+SHA1 (socat-1.7.1.3.tar.gz) = 5a42275da0d8a5182452b36535a74c3cdf21793b
+RMD160 (socat-1.7.1.3.tar.gz) = fa4fdb731b5bef344f6c24a5bc242ae910728d57
+Size (socat-1.7.1.3.tar.gz) = 553489 bytes
SHA1 (patch-aa) = c10b68a5ca36ec27c6e77a01f6f89a832a4862eb