pkgsrc/security/stunnel/distinfo
jym a1ae535f4d Update stunnel to 4.55. Critical update that fixes CVE-2013-1762.
Changelog:

Version 4.55, 2013.03.03, urgency: HIGH:

    Security bugfix
        OpenSSL updated to version 1.0.1e in Win32/Android builds.
        Buffer overflow vulnerability fixed in the NTLM authentication of the CONNECT protocol negotiation. See https://www.stunnel.org/CVE-2013-1762.html for details.
    New features
        SNI wildcard matching in server mode.
        Terminal version of stunnel (tstunnel.exe) build for Win32.
    Bugfixes
        Fixed write half-close handling in the transfer() function (thx to Dustin Lundquist).
        Fixed EAGAIN error handling in the transfer() function (thx to Jan Bee).
        Restored default signal handlers before execvp() (thx to Michael Weiser).
        Fixed memory leaks in protocol negotiation (thx to Arthur Mesh).
        Fixed a file descriptor leak during configuration file reload (thx to Arthur Mesh).
        Closed SSL sockets were removed from the the transfer() c->fds poll.
        Minor fix in handling exotic inetd-mode configurations.
        WCE compilation fixes.
        IPv6 compilation fix in protocol.c.
        Windows installer fixes.
2013-03-06 22:50:31 +00:00

7 lines
358 B
Text

$NetBSD: distinfo,v 1.37 2013/03/06 22:50:31 jym Exp $
SHA1 (stunnel-4.55.tar.gz) = 9d29eb2f1880c7cf9ecbbd96dee8c0f8cc7e7f88
RMD160 (stunnel-4.55.tar.gz) = 31fb1dd51046a34f902148a170cdc6c944ba5b63
Size (stunnel-4.55.tar.gz) = 538408 bytes
SHA1 (patch-aa) = 0e57d4fa383dad7891795073d1f6b5075715b346
SHA1 (patch-ac) = 43521a88606981bc55dd94043d52b1a16f08e583