Updated minicom to 2.7.1.

New for version 2.7.1:
 - CVE-2017-7467: Fix an out of bounds data access that
   can lead to remote code execution. This issue was found
   by Solar Designer of Openwall during a security audit of
   the Virtuozzo 7 product, which contains derived downstream
   code in its prl-vzvncserver component. The corresponding
   Virtuozzo 7 fix is: 6d95404e75

   Openwall would like to thank the Virtuozzo company for
   funding the effort.
This commit is contained in:
wiz 2017-04-18 13:30:57 +00:00
parent 13350b7ad9
commit 96743d6af8
2 changed files with 9 additions and 10 deletions

View file

@ -1,12 +1,11 @@
# $NetBSD: Makefile,v 1.68 2016/03/22 23:24:10 ryoon Exp $
# $NetBSD: Makefile,v 1.69 2017/04/18 13:30:57 wiz Exp $
DISTNAME= minicom-2.7
PKGREVISION= 1
DISTNAME= minicom-2.7.1
CATEGORIES= comms
MASTER_SITES= http://alioth.debian.org/frs/download.php/file/3977/
MASTER_SITES= https://alioth.debian.org/frs/download.php/file/4215/
MAINTAINER= pkgsrc-users@NetBSD.org
HOMEPAGE= http://alioth.debian.org/projects/minicom/
HOMEPAGE= https://alioth.debian.org/projects/minicom/
COMMENT= MS-DOS Telix serial communication program "workalike"
LICENSE= gnu-gpl-v2

View file

@ -1,9 +1,9 @@
$NetBSD: distinfo,v 1.17 2015/11/25 12:48:55 jperkin Exp $
$NetBSD: distinfo,v 1.18 2017/04/18 13:30:57 wiz Exp $
SHA1 (minicom-2.7.tar.gz) = 939eef8ca1bda82ee801b087d9db4f16a19fbe6e
RMD160 (minicom-2.7.tar.gz) = a7947e2e45cc6655b55b70cb65f8784a606248ce
SHA512 (minicom-2.7.tar.gz) = eb9679ac3a3d3585ea06c54407567898e50b981378656e7f8a241071c91054ff0928cc9023d2c79d1936588cdffa9426f4962b556e8daa1783add0c5ac59b5af
Size (minicom-2.7.tar.gz) = 863544 bytes
SHA1 (minicom-2.7.1.tar.gz) = 915432810e7be05c684a634a2c6d45fec3c92cf9
RMD160 (minicom-2.7.1.tar.gz) = cc538b69d3bbc0de13691ac6394f03e97c5dfb5d
SHA512 (minicom-2.7.1.tar.gz) = b429b32d187c3ee915c5074a0d0f08b7e3951cb8528ecbdd889837ff301662c16740ad77bd2bf3baf759c0a84e779a8dc8fd888a4260a0ace15ebc4c2f697c82
Size (minicom-2.7.1.tar.gz) = 875939 bytes
SHA1 (patch-ab) = e87dbe616958b2b1a01a9a7dfa8cb8f8c1a6978f
SHA1 (patch-ac) = b2ffa106989ea562b8ea85bfd15e516713a37f3f
SHA1 (patch-ad) = 407bf7e19ce4ca1aa8580f0b2e79c69d99ad0e6e