update to 0.2.2.39

fixes two ways to crash the program remotely
(DOS vulnerability, CVE-2012-4419)
This commit is contained in:
drochner 2012-09-13 17:09:01 +00:00
parent 0114080e8c
commit 9a1f8b23ee
2 changed files with 6 additions and 6 deletions

View file

@ -1,7 +1,7 @@
# $NetBSD: Makefile,v 1.88 2012/08/13 17:13:45 drochner Exp $
# $NetBSD: Makefile,v 1.89 2012/09/13 17:09:01 drochner Exp $
#
DISTNAME= tor-0.2.2.38
DISTNAME= tor-0.2.2.39
CATEGORIES= net security
MASTER_SITES= http://www.torproject.org/dist/
# MASTER_SITES redirects to https, and ftp(1) cannot handle that.

View file

@ -1,6 +1,6 @@
$NetBSD: distinfo,v 1.55 2012/08/13 17:13:45 drochner Exp $
$NetBSD: distinfo,v 1.56 2012/09/13 17:09:01 drochner Exp $
SHA1 (tor-0.2.2.38.tar.gz) = abac1902d301c6bd5d522e4cc81aead3299cf968
RMD160 (tor-0.2.2.38.tar.gz) = 4402b590435c773b453234ca22b346bafb37376c
Size (tor-0.2.2.38.tar.gz) = 2928500 bytes
SHA1 (tor-0.2.2.39.tar.gz) = cc5021a7656c0cd22de42da9f0ce7335026852bf
RMD160 (tor-0.2.2.39.tar.gz) = 780949054474a99f4a035a7234f8341d3cfbb17f
Size (tor-0.2.2.39.tar.gz) = 2929303 bytes
SHA1 (patch-aa) = 5b89228dc37c459c48f24616933a5673a5a0a0d1