openbsd-ports/net/socat/pkg/PLIST
sthen 887c043498 SECURITY update to socat 1.7.2.1, CVE-2012-0219: heap based buffer overflow
with potential for arbitrary code execution if malicious data is output to
READLINE without option "prompt" or "noprompt".  OK nigel@
2012-05-14 20:58:13 +00:00

32 lines
951 B
Plaintext

@comment $OpenBSD: PLIST,v 1.4 2012/05/14 20:58:14 sthen Exp $
@bin bin/filan
@bin bin/procan
@bin bin/socat
@man man/man1/socat.1
share/doc/socat/
share/doc/socat/FAQ
share/doc/socat/README
share/doc/socat/SECURITY
share/doc/socat/dest-unreach.css
share/doc/socat/socat-genericsocket.html
share/doc/socat/socat-multicast.html
share/doc/socat/socat-openssltunnel.html
share/doc/socat/socat-tun.html
share/doc/socat/socat.html
share/doc/socat/xio.help
share/examples/socat/
share/examples/socat/EXAMPLES
share/examples/socat/daemon.sh
share/examples/socat/ftp.sh
share/examples/socat/gatherinfo.sh
share/examples/socat/mail.sh
share/examples/socat/proxy.sh
share/examples/socat/proxyecho.sh
share/examples/socat/readline-test.sh
share/examples/socat/readline.sh
share/examples/socat/socat_buildscript_for_android.sh
share/examples/socat/socks4a-echo.sh
share/examples/socat/socks4echo.sh
share/examples/socat/test.sh
share/examples/socat/testcert.conf