diff options
author | drochner <drochner@pkgsrc.org> | 2013-09-09 17:49:08 +0000 |
---|---|---|
committer | drochner <drochner@pkgsrc.org> | 2013-09-09 17:49:08 +0000 |
commit | a4d760869d11d4cae1f4902e08fabd7716451a69 (patch) | |
tree | 4bb0b4eddff17941c00c3ef1aa856e160a71f14d /security/py-OpenSSL | |
parent | fda7b6f262459d11dc1bf32ccc1e65b8a2b26305 (diff) | |
download | pkgsrc-a4d760869d11d4cae1f4902e08fabd7716451a69.tar.gz |
update to 0.13.1
This fixes a hostname check bypassing vulnerability (truncation on
NULL-bytes, as seen in other implementations) (CVE-2013-4314)
Diffstat (limited to 'security/py-OpenSSL')
-rw-r--r-- | security/py-OpenSSL/Makefile | 5 | ||||
-rw-r--r-- | security/py-OpenSSL/distinfo | 8 |
2 files changed, 6 insertions, 7 deletions
diff --git a/security/py-OpenSSL/Makefile b/security/py-OpenSSL/Makefile index f6e3f646a30..2a62ede9085 100644 --- a/security/py-OpenSSL/Makefile +++ b/security/py-OpenSSL/Makefile @@ -1,8 +1,7 @@ -# $NetBSD: Makefile,v 1.28 2013/02/06 23:23:43 jperkin Exp $ +# $NetBSD: Makefile,v 1.29 2013/09/09 17:49:08 drochner Exp $ -DISTNAME= pyOpenSSL-0.13 +DISTNAME= pyOpenSSL-0.13.1 PKGNAME= ${PYPKGPREFIX}-${DISTNAME:S/py//} -PKGREVISION= 1 CATEGORIES= security python MASTER_SITES= http://pypi.python.org/packages/source/p/pyOpenSSL/ diff --git a/security/py-OpenSSL/distinfo b/security/py-OpenSSL/distinfo index 9deb57162a5..17f113ce421 100644 --- a/security/py-OpenSSL/distinfo +++ b/security/py-OpenSSL/distinfo @@ -1,5 +1,5 @@ -$NetBSD: distinfo,v 1.7 2012/02/18 20:40:40 gls Exp $ +$NetBSD: distinfo,v 1.8 2013/09/09 17:49:08 drochner Exp $ -SHA1 (pyOpenSSL-0.13.tar.gz) = b4de25c5e4e9d9bc375c419071efc45fa96d5597 -RMD160 (pyOpenSSL-0.13.tar.gz) = 85d6a8a5ca43ee12c4054f8f483db20e13dd6551 -Size (pyOpenSSL-0.13.tar.gz) = 250489 bytes +SHA1 (pyOpenSSL-0.13.1.tar.gz) = 60633ebb821d48d7132a436c897288ec0121b892 +RMD160 (pyOpenSSL-0.13.1.tar.gz) = 5404265202fa7899ac8d9763bd8eda9440ee813f +Size (pyOpenSSL-0.13.1.tar.gz) = 254431 bytes |