Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 537592 (CVE-2015-1379) - <net-misc/socat-{1.7.3.0,2.0.0_beta8}: Possible DoS with fork (CVE-2015-1379)
Summary: <net-misc/socat-{1.7.3.0,2.0.0_beta8}: Possible DoS with fork (CVE-2015-1379)
Status: RESOLVED FIXED
Alias: CVE-2015-1379
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-01-24 20:07 UTC by Agostino Sarubbo
Modified: 2015-03-16 14:55 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-01-24 20:07:47 UTC
From ${URL} :

Socat security advisory 6 - Possible DoS with fork

Overview
  socats signal handler implementations are not async-signal-safe and
  can cause crash or freeze of socat processes

Vulnerability Id: (pending)

Severity: Low

Details
  Socats signal handler implementations are not asnyc-signal-safe. When
  a signal is triggered while the process is within a non
  async-signal-safe function the signal handler will call a non
  sync-signal-safe function too. POSIX specifies the behaviour in this
  situation as undefined. Dependend on involved functions, libraries,
  and operating system, the process can continue, freeze, or crash.
  Mostly this issue occurs when socat is in listening mode with fork
  option and a couple of child processes terminate at the same time.

Testcase
  none

Affected versions
  1.0.0.0 - 1.7.2.4
  2.0.0-b1 - 2.0.0-b7

Not affected or corrected versions
  1.7.3.0 and later
  2.0.0-b8 (to be released) and later

Workaround
  none

Download
  The updated sources can be downloaded from:

    http://www.dest-unreach.org/socat/download/socat-1.7.3.0.tar.gz

Credits
   Credits to Peter Lobsinger


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Jeroen Roovers gentoo-dev 2015-01-25 08:14:04 UTC
Arch teams, please test and mark stable:
=net-misc/socat-1.7.3.0
Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc sparc x86
Comment 2 Jeroen Roovers gentoo-dev 2015-01-25 09:44:05 UTC
Stable for HPPA.
Comment 3 Markus Meier gentoo-dev 2015-01-25 21:22:52 UTC
arm stable
Comment 4 Agostino Sarubbo gentoo-dev 2015-01-28 13:33:56 UTC
amd64 stable
Comment 5 Agostino Sarubbo gentoo-dev 2015-01-31 10:33:20 UTC
ppc stable
Comment 6 Jeroen Roovers gentoo-dev 2015-02-07 09:34:11 UTC
Waiting for alpha, ia64, sparc and x86.
Comment 7 Agostino Sarubbo gentoo-dev 2015-02-15 15:09:00 UTC
x86 stable
Comment 8 Agostino Sarubbo gentoo-dev 2015-02-16 10:21:49 UTC
sparc stable
Comment 9 Agostino Sarubbo gentoo-dev 2015-02-23 11:39:21 UTC
ia64 stable
Comment 10 Agostino Sarubbo gentoo-dev 2015-02-24 10:59:51 UTC
alpha stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 11 Yury German Gentoo Infrastructure gentoo-dev Security 2015-02-24 22:42:15 UTC
Arches, Thank you for your work.
GLSA Vote: No

Maintainer(s), please drop the vulnerable version(s).
Comment 12 Kristian Fiskerstrand gentoo-dev Security 2015-02-24 22:44:51 UTC
GLSA Vote: No
Comment 13 Yury German Gentoo Infrastructure gentoo-dev Security 2015-03-07 07:15:15 UTC
Maintainer(s), please drop the vulnerable version(s).
Comment 14 Jeroen Roovers gentoo-dev 2015-03-08 07:28:48 UTC
(In reply to Yury German from comment #13)

Done.
Comment 15 Yury German Gentoo Infrastructure gentoo-dev Security 2015-03-16 14:55:16 UTC
Maintainer(s), Thank you for you for cleanup.