Potential security fix:

Update to 0.7.  Fixes CVE-2006-0224 (buffer overflow when reading
configuration file).

No other port uses this.
This commit is contained in:
naddy 2006-02-08 19:17:06 +00:00
parent bbeedf693c
commit 7698a8efe2
2 changed files with 7 additions and 9 deletions

View File

@ -1,11 +1,9 @@
# $OpenBSD: Makefile,v 1.3 2006/01/02 18:15:53 bernd Exp $
# $OpenBSD: Makefile,v 1.4 2006/02/08 19:17:06 naddy Exp $
COMMENT= "library of assorted spiffy things"
DISTNAME= libast-0.6.1
PKGNAME= ${DISTNAME}p0
SHARED_LIBS= ast 2.1
MODGNU_SHARED_LIBS= ast ''
DISTNAME= libast-0.7
SHARED_LIBS= ast 2.2
CATEGORIES= devel
HOMEPAGE= http://eterm.sourceforge.net/

View File

@ -1,4 +1,4 @@
MD5 (libast-0.6.1.tar.gz) = 1cbbf86a0afb74a5905dc92982117250
RMD160 (libast-0.6.1.tar.gz) = 85d6a6433fe12c81d120adf7e6567c0676d26b8c
SHA1 (libast-0.6.1.tar.gz) = 894b9dda8e6f971e0192b78d05dc4812839a01cb
SIZE (libast-0.6.1.tar.gz) = 356881
MD5 (libast-0.7.tar.gz) = a9ec3b2da317f35869316e6d9571d296
RMD160 (libast-0.7.tar.gz) = 82dedafc23668f0bbecbf09433676d4b31e9e154
SHA1 (libast-0.7.tar.gz) = 8449049642c5a945336a326b8d512e4d261232d0
SIZE (libast-0.7.tar.gz) = 508654