http://www.analog.cx/security2.html "There is a buffer overflow bug in all versions of analog released prior to today. A malicious user could use an ALIAS command to construct very long strings which were not checked for length. This bug is particularly dangerous if the form interface (which allows unknown users to run the program via a CGI script) has been installed. This bug was discovered by the program author, and there is no known exploit. However, users are advised to upgrade to one of the two safe versions immediately, especially if they have installed the form interface." Fix: Upgrade port to 4.16 (currently 4.11) using patch below. This can also close out PR ports/25011 which was a patch to upgrade this port to analog 4.15. This patch is identical to the one supplied there modulo the Makefile and distinfo changes. How-To-Repeat: No known exploit...yet. (Bug found by progam author.)
State Changed From-To: open->closed committed, thanks