package/socat: security bump to version 1.7.4.1
Buffer size option (-b) is internally doubled for CR-CRLF conversion,
but not checked for integer overflow. This could lead to heap based
buffer overflow, assuming the attacker could provide this parameter.
- Update indentation in hash file (two spaces)
- Update hash of README file due to minor updates:
https://repo.or.cz/socat.git/commit/
b145170837d75bd7a1a5803283910ab075d47bea
https://repo.or.cz/socat.git/commit/
0a115feadc3102f17e0a8a1a985319af0295f704
http://www.dest-unreach.org/socat/doc/CHANGES
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>