openbsd-ports/net/socat/patches/patch-doc_socat_1
sthen 887c043498 SECURITY update to socat 1.7.2.1, CVE-2012-0219: heap based buffer overflow
with potential for arbitrary code execution if malicious data is output to
READLINE without option "prompt" or "noprompt".  OK nigel@
2012-05-14 20:58:13 +00:00

19 lines
381 B
Plaintext

$OpenBSD: patch-doc_socat_1,v 1.4 2012/05/14 20:58:14 sthen Exp $
--- doc/socat.1.orig Sun Apr 22 11:25:49 2012
+++ doc/socat.1 Mon May 14 19:23:58 2012
@@ -3485,11 +3485,11 @@ error\&.
.SH "FILES"
.PP
-/usr/bin/socat
+${LOCALBASE}/bin/socat
.br
-/usr/bin/filan
+${LOCALBASE}/bin/filan
.br
-/usr/bin/procan
+${LOCALBASE}/bin/procan
.PP
.SH "ENVIRONMENT VARIABLES"