blob: 61d9c3a2f5101b5d02d29865c3252ed7bdea91e1 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201208-01">
<title>socat: Arbitrary code execution</title>
<synopsis>A buffer overflow in socat might allow remote attackers to execute
arbitrary code.
<product type="ebuild">socat</product>
<announced>August 14, 2012</announced>
<revised>August 14, 2012: 1</revised>
<access>local, remote</access>
<package name="net-misc/socat" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
<p>socat is a multipurpose bidirectional relay, similar to netcat.</p>
<p>A vulnerability in the "xioscan_readline()" function in xio-readline.c
could cause a heap-based buffer overflow.
<impact type="high">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the socat process.
<p>There is no known workaround at this time.</p>
<p>All socat users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-misc/socat-"
<uri link="">CVE-2012-0219</uri>
<uri link="">
Socat security advisory 3
<metadata timestamp="Wed, 11 Jul 2012 21:57:34 +0000" tag="requester">ackle</metadata>
<metadata timestamp="Tue, 14 Aug 2012 20:30:08 +0000" tag="submitter">ackle</metadata>