| Summary: | socat: Stack overflow vulnerability in parser | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED WONTFIX | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | abhgupta, carnil, dmcphers, jialiu, jokerman, kseifried, lmeyer, mmccomas, pwouters, tiwillia |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | socat 2.0.0-b9, socat 1.7.3.1 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-02-11 09:29:00 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | 1186301, 1303888, 1303889 | ||
| Bug Blocks: | 1303890 | ||
|
Description
Adam Mariš
2016-02-02 10:52:46 UTC
Created socat tracking bugs for this issue: Affects: fedora-all [bug 1303888] Affects: epel-all [bug 1303889] Upstream commit: http://repo.or.cz/socat.git/commitdiff/226c555edb82f6901d7d7448d93e6d09b1132c73 External References: http://www.dest-unreach.org/socat/contrib/socat-secadv8.html Overflow is triggered by long command line arguments. While these may be based on untrusted input, they typically are not. There's currently no plan to correct this in Red Hat Enterprise Linux. The fix may be added if the component is updated to fixed upstream version in future updates. |