package/socat: security bump to version 1.7.4.1
authorFabrice Fontaine <fontaine.fabrice@gmail.com>
Wed, 27 Jan 2021 21:44:56 +0000 (22:44 +0100)
committerPeter Korsgaard <peter@korsgaard.com>
Sat, 30 Jan 2021 12:41:50 +0000 (13:41 +0100)
commit1b18d9104f7b2f4e7710a094501d72d457c8001f
treecce838bc175d6fa9334b05120f4dc19352dc041d
parent1f50a4437103143296cbbff217ed918d31537a92
package/socat: security bump to version 1.7.4.1

Buffer size option (-b) is internally doubled for CR-CRLF conversion,
but not checked for integer overflow. This could lead to heap based
buffer overflow, assuming the attacker could provide this parameter.

- Update indentation in hash file (two spaces)
- Update hash of README file due to minor updates:
  https://repo.or.cz/socat.git/commit/b145170837d75bd7a1a5803283910ab075d47bea
  https://repo.or.cz/socat.git/commit/0a115feadc3102f17e0a8a1a985319af0295f704

http://www.dest-unreach.org/socat/doc/CHANGES

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/socat/socat.hash
package/socat/socat.mk