2012/05/14: A heap based buffer overflow vulnerability has been found with data that happens to be output on the READLINE address. Successful exploitation may allow an attacker to execute arbitrary code with the privileges of the socat process (advisory[1]). Fixed versions are 1.7.2.1 and 2.0.0-b5. Patches are available in the download area. [1] http://www.dest-unreach.org/socat/contrib/socat-secadv3.html
Arch teams, please test and mark stable: =net-misc/socat-1.7.2.1 Target KEYWORDS="alpha amd64 arm hppa ia64 ppc sparc x86"
Stable for HPPA.
Stable on alpha.
amd64 stable
x86 stable
arm stable
ia64/sparc stable
CVE-2012-0219 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0219): Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
got ppc stabled by Brent on May 21th
Thanks, everyone. Filing a new GLSA request.
This issue was resolved and addressed in GLSA 201208-01 at http://security.gentoo.org/glsa/glsa-201208-01.xml by GLSA coordinator Sean Amoss (ackle).