SECURITY UPDATE to nginx-1.0.15
resolves: CVE-2012-2089 - Buffer overflow in the ngx_http_mp4_module OK sthen@ jasper@ william@
This commit is contained in:
parent
f533a0bb0d
commit
edbab203e8
@ -1,8 +1,8 @@
|
||||
# $OpenBSD: Makefile,v 1.51 2012/03/16 00:44:06 william Exp $
|
||||
# $OpenBSD: Makefile,v 1.52 2012/04/17 13:00:28 gsoares Exp $
|
||||
|
||||
COMMENT= robust and small HTTP server and mail proxy server
|
||||
|
||||
DISTNAME= nginx-1.0.14
|
||||
DISTNAME= nginx-1.0.15
|
||||
CATEGORIES= www
|
||||
|
||||
HOMEPAGE= http://nginx.org/
|
||||
|
@ -1,5 +1,5 @@
|
||||
MD5 (nginx-1.0.14.tar.gz) = AZhE5Iw0lSJTyibdbijDXA==
|
||||
RMD160 (nginx-1.0.14.tar.gz) = 5vWa2RJkZ+9KKuWAyJdrSIQKupA=
|
||||
SHA1 (nginx-1.0.14.tar.gz) = 90y9pPcmMnhBq+BmdsYDQZhCfOk=
|
||||
SHA256 (nginx-1.0.14.tar.gz) = mOSDkl2rg2g3YtsywhoeLsaF15opjC4y54WvDMS6468=
|
||||
SIZE (nginx-1.0.14.tar.gz) = 692465
|
||||
MD5 (nginx-1.0.15.tar.gz) = F9pIAiCbg9m+uw8O3Zdd/A==
|
||||
RMD160 (nginx-1.0.15.tar.gz) = mWU0mZFrgfsPWEJ1VISYNgbOpew=
|
||||
SHA1 (nginx-1.0.15.tar.gz) = 5QazAeqEn1jy77SZ13uBn+Ve6po=
|
||||
SHA256 (nginx-1.0.15.tar.gz) = Ha85UGI8kLCE5+zrEEBxWWBgrKXHIb+JBUn8KZCx6+Y=
|
||||
SIZE (nginx-1.0.15.tar.gz) = 693025
|
||||
|
Loading…
Reference in New Issue
Block a user