Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Jan 2014 07:32:29 +0000 (UTC)
From:      Emanuel Haupt <ehaupt@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r341683 - head/net/socat
Message-ID:  <201401290732.s0T7WTVG017017@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: ehaupt
Date: Wed Jan 29 07:32:29 2014
New Revision: 341683
URL: http://svnweb.freebsd.org/changeset/ports/341683
QAT: https://qat.redports.org/buildarchive/r341683/

Log:
  Update to 1.7.2.3, this fixes a security issue, where socats PROXY-CONNECT
  address was vulnerable to a buffer overflow with data provided on the command
  line.
  
  Security:       CVE-2014-0019

Modified:
  head/net/socat/Makefile
  head/net/socat/distinfo

Modified: head/net/socat/Makefile
==============================================================================
--- head/net/socat/Makefile	Wed Jan 29 07:25:06 2014	(r341682)
+++ head/net/socat/Makefile	Wed Jan 29 07:32:29 2014	(r341683)
@@ -2,8 +2,7 @@
 # $FreeBSD$
 
 PORTNAME=	socat
-PORTVERSION=	1.7.2.2
-PORTREVISION=	2
+PORTVERSION=	1.7.2.3
 CATEGORIES=	net ipv6
 MASTER_SITES=	http://www.dest-unreach.org/socat/download/ \
 		CRITICAL

Modified: head/net/socat/distinfo
==============================================================================
--- head/net/socat/distinfo	Wed Jan 29 07:25:06 2014	(r341682)
+++ head/net/socat/distinfo	Wed Jan 29 07:32:29 2014	(r341683)
@@ -1,2 +1,2 @@
-SHA256 (socat-1.7.2.2.tar.bz2) = 9a167af11a4d3809cbc66f5e2dcb39b6e371251282ef5de6ea6ff0c4be8a953c
-SIZE (socat-1.7.2.2.tar.bz2) = 433222
+SHA256 (socat-1.7.2.3.tar.bz2) = 0598ac54af7b138cda9e3c141bcf0cc63eeb2ab31f468a772dc3f7eb3896aad0
+SIZE (socat-1.7.2.3.tar.bz2) = 424461



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401290732.s0T7WTVG017017>