File _patchinfo of Package patchinfo.34176

<patchinfo incident="34176">
  <issue tracker="bnc" id="1160293">socat fails with -fno-common</issue>
  <issue tracker="jsc" id="PED-8413">Maint: socat 1.7.3.2 doesn't support TLS 1.3</issue>
  <packager>msmeissn</packager>
  <rating>moderate</rating>
  <category>recommended</category>
  <summary>Recommended update for socat</summary>
  <description>This update for socat fixes the following issues:

Update to 1.8.0.0:

* Support for network namespaces (option netns)
* TCP client now automatically tries all addresses (IPv4 and IPv6) provided by nameserver until success
* Implementation of POSIX message queue (mq) control and access on Linux (addresses POSIXMQ-READ and following)
* New wrapper script socat-chain.sh allows to stack two addresses, e.g.HTTP proxy connect over SSL
* New script socat-mux.sh allows n-to-1 / 1-to-n communications
* New script socat-broker.sh allows group communications
* Experimental socks5 client feature
* Address ACCEPT-FD for systemd "inetd" mode
* UDP-Lite and DCCP address types
* Addresses SOCKETPAIR and SHELL
* New option bind-tmpname allows forked off children to bind UNIX domain client sockets to random unique pathes
* New option retrieve-vlan (with INTERFACE addresses) now makes kernel keep VLAN tags in incoming packets
* Simple statistics output with Socat option --statistics and with SIGUSR1
* A couple of new options, many fixes and corrections, see file CHANGES

- Note: This version introduces "socat1", linking to "socat"

Update to 1.7.4.4:

* FIX: In error.c msg2() there was a stack overflow on long messages: The
  terminating \0 Byte was written behind the last position.
* FIX: UDP-RECVFROM with fork sometimes terminated when multiple packets
  arrived.
* FIX: a couple of weaknesses and errors when accessing invalid or
  incompatible file system entries with UNIX domain, file, and generic
  addresses.
* FIX: bad parser error message on "socat /tmp/x\"x/x -"

Update to 1.7.4.3:

* fixes the TCP_INFO issue that broke building on non-Linux platforms. 

Update to version 1.7.4.2:

* Fixes a lot of bugs, e.g., for options -r and -R.
* Further bugfixes, see the CHANGES file

Update to 1.7.4.1:

Security:

* Buffer size option (-b) is internally doubled for CR-CRLF conversion,
  but not checked for integer overflow. This could lead to heap based buffer
  overflow, assuming the attacker could provide this parameter. 
* Many further bugfixes and new features, see the CHANGES file

Update to version 1.7.3.4:

* bugfix release, see the CHANGES file for all changes

Update to version 1.7.3.3:

* bugfix release, see the CHANGES file for all changes

- We HAVE_SSLv23_*_method, just not as functions, but macros
  add the relevant defines in the command line so support for
  autonegotiation of the highest TLS version is restored.
</description>
</patchinfo>
openSUSE Build Service is sponsored by