Bug 1185942 - socat: possible denial of service with fork
Summary: socat: possible denial of service with fork
Keywords:
Status: CLOSED DUPLICATE of bug 1185711
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1185948
TreeView+ depends on / blocked
 
Reported: 2015-01-26 16:31 UTC by Vasyl Kaigorodov
Modified: 2019-09-29 13:27 UTC (History)
12 users (show)

Fixed In Version: socat 1.7.3.0, 2.0.0-b8
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-01-27 09:10:38 UTC
Embargoed:


Attachments (Terms of Use)

Description Vasyl Kaigorodov 2015-01-26 16:31:13 UTC
Below issue was reported [1] in socat:

Socats signal handler implementations are not asnyc-signal-safe. When a signal is triggered while the process is within a non async-signal-safe function the signal handler will call a non sync-signal-safe function too. POSIX specifies the behaviour in this situation as undefined. Dependend on involved functions, libraries, and operating system, the process can continue, freeze, or crash. Mostly this issue occurs when socat is in listening mode with fork option and a couple of child processes terminate at the same time.

[1]: http://www.dest-unreach.org/socat/contrib/socat-secadv6.txt

Comment 1 Vasyl Kaigorodov 2015-01-26 16:31:41 UTC
Created socat tracking bugs for this issue:

Affects: fedora-all [bug 1185945]
Affects: epel-all [bug 1185946]

Comment 2 Tomas Hoger 2015-01-26 19:30:56 UTC
This should be a dupe of bug 1185711.

Comment 3 Vasyl Kaigorodov 2015-01-27 09:10:38 UTC

*** This bug has been marked as a duplicate of bug 1185711 ***

Comment 4 Vasyl Kaigorodov 2015-01-27 09:13:00 UTC
(In reply to Tomas Hoger from comment #2)
> This should be a dupe of bug 1185711.

Yes, it is. Thanks for catching this.


Note You need to log in before you can comment on or make changes to this bug.