Socat upstream, released an advisory: [1] http://www.dest-unreach.org/socat/contrib/socat-secadv2.html describing a stack overflow flaw, present in Socat bidirectional data relay, when processing command line arguments (address specifications, host names, file names), longer than 512 bytes. An attacker, able to inject data into sockat's command line (potentially remotely via CGI script invocation), could use this flaw to execute arbitrary code with the privileges of the socat process. References: [2] http://bugs.gentoo.org/show_bug.cgi?id=330785 Upstream patch against v1.7.2: [3] http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch Credit: Issue discovered and reported by Felix Gröbert of Google Security Team CVE Request: [4] http://www.openwall.com/lists/oss-security/2010/08/02/3
This issue affects the versions of the socat package, as shipped with Fedora releases of 12 and 13. Please fix.
Created socat tracking bugs for this issue Affects: fedora-all [bug 620430]
The CVE identifier of CVE-2010-2799 has been assigned to this.
*** This bug has been marked as a duplicate of bug 620430 ***
This shouldn't been closed as a duplicate of the tracking bug.