Summary: | <net-misc/socat-1.7.1.3: stack overflow vulnerability (CVE-2010-2799) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | netmon |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.dest-unreach.org/socat/contrib/socat-secadv2.html | ||
Whiteboard: | C2 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Jeroen Roovers (RETIRED)
![]() Arch teams, please test and mark stable: =net-misc/socat/socat-1.7.1.3 Target KEYWORDS="alpha amd64 arm hppa ia64 ppc sparc x86" Arch teams, please test and mark stable: =net-misc/socat-1.7.1.3 Target KEYWORDS="alpha amd64 arm hppa ia64 ppc sparc x86" amd64 done Stable for HPPA PPC. Nearly perfect. ;) Whiteboard information: http://www.gentoo.org/security/en/vulnerability-policy.xml#doc_chap3 It fails 3 tests on my x86 testbox, but thats due to the lack of tun/tap within my Kernel... Another failure is in the ioctl-void-test, but that is also no regression! At the end it works for my usage (socket to port redirection). (In reply to comment #6) > It fails 3 tests on my x86 testbox, but thats due to the lack of tun/tap within > my Kernel... Another failure is in the ioctl-void-test, but that is also no > regression! At the end it works for my usage (socket to port redirection). The test suite can be very useful, but not to reassure you that it built fine and works well in all circumstances. You're free to review all previous socat stabilisation bug reports for more information, as this isn't anything new, isn't a regression and has an open bug #277104 sitting doing nothing for a good while now. stable x86, thanks Andreas arm stable alpha/ia64/sparc stable Rerating C2. Closing as noglsa because of the limited vector. CVE-2010-2799 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2799): Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments. |