Summary: | <net-misc/socat-{1.7.2.1,2.0.0-b5} heap based buffer overflow vulnerability allows arbitrary code execution (CVE-2012-0219) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | netmon |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Jeroen Roovers (RETIRED)
![]() Arch teams, please test and mark stable: =net-misc/socat-1.7.2.1 Target KEYWORDS="alpha amd64 arm hppa ia64 ppc sparc x86" Stable for HPPA. Stable on alpha. amd64 stable x86 stable arm stable ia64/sparc stable CVE-2012-0219 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0219): Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address. got ppc stabled by Brent on May 21th Thanks, everyone. Filing a new GLSA request. This issue was resolved and addressed in GLSA 201208-01 at http://security.gentoo.org/glsa/glsa-201208-01.xml by GLSA coordinator Sean Amoss (ackle). |