Path to this page:
./
net/socat,
netcat++ (extended design, new implementation)
Branch: pkgsrc-2010Q2,
Version: 1.7.1.3,
Package name: socat-1.7.1.3,
Maintainer: pkgsrc-userssocat is a relay for bidirectional data transfer between two
independent data channels. Each of these data channels may be a file,
pipe, device (serial line etc. or a pseudo terminal), a socket (UNIX,
IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a
file descriptor (stdin etc.), the GNU line editor, a program, or a
combination of two of these. These modes include generation of
"listening" sockets, pipes and pseudo terminals.
Required to run:[
devel/readline]
Package options: inet6
Master sites:
SHA1: 5a42275da0d8a5182452b36535a74c3cdf21793b
RMD160: fa4fdb731b5bef344f6c24a5bc242ae910728d57
Filesize: 540.517 KB
Version history: (Expand)
- (2010-08-14) Updated to version: socat-1.7.1.3
- (2010-07-05) Package has been reborn
- (2010-07-04) Package added to pkgsrc.se, version socat-1.7.1.2 (created)
CVS history: (Expand)
2010-08-13 16:26:23 by Matthias Scheler | Files touched by this commit (2) | |
Log message:
Pullup ticket #3206 - requested by tron
net/socat: security update
Revisions pulled up:
- net/socat/Makefile 1.24
- net/socat/distinfo 1.15
---
Module Name: pkgsrc
Committed By: zafer
Date: Thu Aug 12 17:54:14 UTC 2010
Modified Files:
pkgsrc/net/socat: Makefile distinfo
Log message:
Update socat to 1.7.1.3
Changelog:
security:
fixed a stack overflow vulnerability that occurred when command
line arguments (whole addresses, host names, file names) were longer
than 512 bytes.
Note that this could only be exploited when an attacker was able to
inject data into socat's command line.
Full credits to Felix Grobert, Google Security Team, for finding and
reporting this issue
|