Date: Wed, 29 Jan 2014 07:32:29 +0000 (UTC) From: Emanuel Haupt <ehaupt@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r341683 - head/net/socat Message-ID: <201401290732.s0T7WTVG017017@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: ehaupt Date: Wed Jan 29 07:32:29 2014 New Revision: 341683 URL: http://svnweb.freebsd.org/changeset/ports/341683 QAT: https://qat.redports.org/buildarchive/r341683/ Log: Update to 1.7.2.3, this fixes a security issue, where socats PROXY-CONNECT address was vulnerable to a buffer overflow with data provided on the command line. Security: CVE-2014-0019 Modified: head/net/socat/Makefile head/net/socat/distinfo Modified: head/net/socat/Makefile ============================================================================== --- head/net/socat/Makefile Wed Jan 29 07:25:06 2014 (r341682) +++ head/net/socat/Makefile Wed Jan 29 07:32:29 2014 (r341683) @@ -2,8 +2,7 @@ # $FreeBSD$ PORTNAME= socat -PORTVERSION= 1.7.2.2 -PORTREVISION= 2 +PORTVERSION= 1.7.2.3 CATEGORIES= net ipv6 MASTER_SITES= http://www.dest-unreach.org/socat/download/ \ CRITICAL Modified: head/net/socat/distinfo ============================================================================== --- head/net/socat/distinfo Wed Jan 29 07:25:06 2014 (r341682) +++ head/net/socat/distinfo Wed Jan 29 07:32:29 2014 (r341683) @@ -1,2 +1,2 @@ -SHA256 (socat-1.7.2.2.tar.bz2) = 9a167af11a4d3809cbc66f5e2dcb39b6e371251282ef5de6ea6ff0c4be8a953c -SIZE (socat-1.7.2.2.tar.bz2) = 433222 +SHA256 (socat-1.7.2.3.tar.bz2) = 0598ac54af7b138cda9e3c141bcf0cc63eeb2ab31f468a772dc3f7eb3896aad0 +SIZE (socat-1.7.2.3.tar.bz2) = 424461
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401290732.s0T7WTVG017017>