to give useful information, just spotted an obvious case where data passed from subclasses are used for malloc() unchecked, so added a check. I can't claim that the CVE report is fixed because it is not clear what it is about, but it seems that this fixes an issue. bump PKGREVISION
14 lines
816 B
Text
14 lines
816 B
Text
$NetBSD: distinfo,v 1.6 2009/08/05 20:58:56 drochner Exp $
|
|
|
|
SHA1 (wxGTK-2.8.10-libtool.diff.bz2) = 62ff30c26efdd73252bed2d07b82a9b9d3ef890f
|
|
RMD160 (wxGTK-2.8.10-libtool.diff.bz2) = 64e1c32caa4bd6a0503bce4764e3ddc1cba68f8a
|
|
Size (wxGTK-2.8.10-libtool.diff.bz2) = 154573 bytes
|
|
SHA1 (wxGTK-2.8.10.tar.bz2) = 1e4bee16a423efeef665ed70e82b6e7dc5468cf4
|
|
RMD160 (wxGTK-2.8.10.tar.bz2) = b007de9b19ef4830d9f484c0d12595a14e66d432
|
|
Size (wxGTK-2.8.10.tar.bz2) = 9365627 bytes
|
|
SHA1 (patch-aa) = 1a30c79f07ea8ea5dff02fad9b5e1ba8dadde01a
|
|
SHA1 (patch-ab) = 82960daef0616824718f3c04929871aeb0e258a2
|
|
SHA1 (patch-ac) = 50cf253797f2dee8b9dab08d138d0070e25e7a8c
|
|
SHA1 (patch-ba) = e47f8613835ce309daff09ae3265d44f37493579
|
|
SHA1 (patch-bb) = 52df734a1df364dc5599a2b9252a15b87cae13b1
|
|
SHA1 (patch-ca) = 4df0c2629c61fbf83a121eb16e490e9c2abb5ad8
|