1b18d9104f
Buffer size option (-b) is internally doubled for CR-CRLF conversion, but not checked for integer overflow. This could lead to heap based buffer overflow, assuming the attacker could provide this parameter. - Update indentation in hash file (two spaces) - Update hash of README file due to minor updates: https://repo.or.cz/socat.git/commit/b145170837d75bd7a1a5803283910ab075d47bea https://repo.or.cz/socat.git/commit/0a115feadc3102f17e0a8a1a985319af0295f704 http://www.dest-unreach.org/socat/doc/CHANGES Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com> |
||
---|---|---|
.. | ||
0001-no-documentation.patch | ||
0002-compat-set-NETDB_INTERNAL.patch | ||
Config.in | ||
socat.hash | ||
socat.mk |