Commit Graph

22 Commits

Author SHA1 Message Date
Andrew Childs
14e505c6fa socat: fix darwin build 2019-04-26 23:56:33 +09:00
R. RyanTM
6c3e0907a5 socat: 1.7.3.2 -> 1.7.3.3
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/socat/versions
2019-04-16 18:31:39 +02:00
Jan Malakhovski
131e6d664b socat: make tests run, but disable 2018-08-11 09:35:33 +00:00
Robin Gloster
108c6d1a03
socat: 1.7.3.1 -> 1.7.3.2
fixes compatibility with openssl 1.1.0 (and libressl)
2017-02-17 00:11:03 +01:00
Robin Gloster
5185bc1773 Merge remote-tracking branch 'upstream/master' into hardened-stdenv 2016-07-15 14:41:01 +00:00
obadz
ca17bd0c8a socat: add readline support 2016-06-13 12:09:32 +01:00
Franz Pletz
aff1f4ab94 Use general hardening flag toggle lists
The following parameters are now available:

  * hardeningDisable
    To disable specific hardening flags
  * hardeningEnable
    To enable specific hardening flags

Only the cc-wrapper supports this right now, but these may be reused by
other wrappers, builders or setup hooks.

cc-wrapper supports the following flags:

  * fortify
  * stackprotector
  * pie (disabled by default)
  * pic
  * strictoverflow
  * format
  * relro
  * bindnow
2016-03-05 18:55:26 +01:00
Robin Gloster
3b4765c9e5 Merge remote-tracking branch 'upstream/master' into hardened-stdenv 2016-02-28 16:32:57 +00:00
Franz Pletz
88d1564985 socat: 1.7.3.0 -> 1.7.3.1 (CVE-2016-2217)
https://lwn.net/Vulnerabilities/674840/

http://www.dest-unreach.org/socat/contrib/socat-secadv7.html
http://www.dest-unreach.org/socat/contrib/socat-secadv8.html
2016-02-27 19:10:38 +01:00
Robin Gloster
a73762200d socat: enable pie hardening 2016-02-26 16:45:49 +00:00
Robin Gloster
8613060425 socat: add patch to fix build with libressl
This fixes the build for libressl >= 2.3 as some legacy openssl code has
been removed.
2015-12-23 22:08:33 +00:00
Andrey Arapov
7a7e59d2a9 socat: Update from 1.7.2.4 to 1.7.3.0, fixes a possible denial of service attack
socat: Update from 1.7.2.4 to 1.7.3.0, fixes a possible denial of service attack
(CVE Id pending), improves SSL client security, and provides a couple of bug and
porting fixes.

Among new features, socat now enables OpenSSL server side use of ECDHE ciphers,
providing PFS (Perfect Forward Secrecy)

http://www.dest-unreach.org/socat/doc/CHANGES
2015-01-25 13:48:11 +01:00
Pascal Wittmann
8d67b9a240 transformed meta.maintainers of some packages into lists 2014-09-13 13:52:02 +02:00
John Wiegley
010132e302 Change several package constraints from linux to unix
They all build on Darwin.
2014-04-12 16:01:16 -05:00
Evgeny Egorochkin
e585d65b49 socat: update from 1.7.2.3 to 1.7.2.4 2014-03-13 09:11:54 +02:00
Evgeny Egorochkin
0c439c3a1a socat: update from 1.7.2.2 to 1.7.2.3, potentially fixes CVE-2014-0019 2014-02-06 09:50:00 +02:00
Eelco Dolstra
59cad4dc07 socate: Update to 1.7.2.2, 2.0.0-b6
CVE-2013-3571
2013-11-04 21:10:59 +01:00
Eelco Dolstra
8fc1fe9f6b socat: Update to 1.7.2.1
CVE-2012-0219
2013-04-12 15:01:01 +02:00
Lluís Batlle i Rossell
5521faad65 Updating socat. I thought it could have improvements in performance for nixos
build-vm in my computer, but does not.


svn path=/nixpkgs/trunk/; revision=33239
2012-03-18 18:33:10 +00:00
Eelco Dolstra
b88adf69c3 * socat updated to 1.7.1.2.
svn path=/nixpkgs/trunk/; revision=22252
2010-06-14 08:01:38 +00:00
Eelco Dolstra
5b098479f5 * socat updated to 1.7.1.1.
svn path=/nixpkgs/trunk/; revision=19269
2010-01-06 17:36:33 +00:00
Eelco Dolstra
7f5b839524 * Removed selectVersion. There's no good reason to write
`selectVersion ./foo "bar"' instead of `import ./foo/bar.nix'.
* Replaced `with args' with formal function arguments in several
  packages.
* Renamed several files to `default.nix'.  As a general rule, version
  numbers should only be included in the filename when there is a
  reason to keep multiple versions of a package in Nixpkgs.
  Otherwise, it just makes it harder to update the package.

svn path=/nixpkgs/trunk/; revision=18403
2009-11-18 09:39:59 +00:00