1b18d9104f
Buffer size option (-b) is internally doubled for CR-CRLF conversion, but not checked for integer overflow. This could lead to heap based buffer overflow, assuming the attacker could provide this parameter. - Update indentation in hash file (two spaces) - Update hash of README file due to minor updates: https://repo.or.cz/socat.git/commit/b145170837d75bd7a1a5803283910ab075d47bea https://repo.or.cz/socat.git/commit/0a115feadc3102f17e0a8a1a985319af0295f704 http://www.dest-unreach.org/socat/doc/CHANGES Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
9 lines
548 B
Plaintext
9 lines
548 B
Plaintext
# From http://www.dest-unreach.org/socat/download.md5sum
|
|
md5 36cad050ecf4981ab044c3fbd75c643f socat-1.7.4.1.tar.bz2
|
|
# From http://www.dest-unreach.org/socat/download.sha256sum
|
|
sha256 3faca25614e89123dff5045680549ecef519d02e331aaf3c4f5a8f6837c675e9 socat-1.7.4.1.tar.bz2
|
|
# Locally calculated
|
|
sha256 b1ebebbce145027f4268211f36d121b083aeeabdc1736eb144b8afd8e86ce8da README
|
|
sha256 8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643 COPYING
|
|
sha256 fd9e48ca316a5032069b9521f4f4b4d9b1c60365012bae1e62286bcd5bd2e761 COPYING.OpenSSL
|