Juergen Daubert
689c0d2b2d
secutity fix for - CVE-2020-10543 Buffer overflow caused by a crafted regular expression - CVE-2020-10878 Integer overflow via malformed bytecode produced by a crafted regular expression - CVE-2020-12723 Buffer overflow caused by a crafted regular expression
6 lines
418 B
Plaintext
6 lines
418 B
Plaintext
untrusted comment: verify with /etc/ports/core.pub
|
|
RWRJc1FUaeVeqkQPxCQb6ZthHNVCNg3zjuYe3WcN+mVvmgo2J4rmDkHYuHSFo0yKagdBHelbZR22PbU3aV32ECWx7Qyn9118JQA=
|
|
SHA256 (Pkgfile) = 1aceb9b4274056fc6b6e9e108fa2ddf924b68ed843da86292b8dff4a08c10595
|
|
SHA256 (.footprint) = 88eaa89795787a764978fc925216487d1166ef119a84fe154226f33c429ffbbb
|
|
SHA256 (perl-5.28.3.tar.xz) = 77dc1ddf541643af14d585867d3d0741cce45d0dbe8f1467024e63165d9e2fc5
|