There are a few security fixes and lots of small other fixes.
http://www.dest-unreach.org/socat/doc/CHANGES
The SSL EGD and compression stuff is now properly ifdef'ed so we can get
rid of a lot of patching. New patch due to non-portable getprotobynumber_r
use. I added a test target, so tests can be run from the ports directory.
ok sthen, maintainer timeout
- A stack overflow in vulnerability was found that can be triggered when
command line arguments (complete address specifications, host names,
file names) are longer than 512 bytes.
- In the OpenSSL address implementation the hard coded 1024 bit DH p
parameter was not prime. [..] Fix: generated a new 2048bit prime.
"netcat++" (extended design, new implementation)
socat is a relay for bidirectional data transfer between two independent
data channels. Each of these data channels may be a file, pipe, device
(serial line etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw,
UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor
(stdin etc.), the GNU line editor (readline), a program, or a
combination of two of these. These modes include generation of
"listening" sockets, mamed pipes, and pseudo terminals.
Submitted by Jon Trembley <jon@brain-box.net>