drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in socat
Name: |
Ausführen beliebiger Kommandos in socat |
|
ID: |
FEDORA-2011-0098 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 14 |
|
Datum: |
Mo, 7. März 2011, 08:04 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2799 |
|
Applikationen: |
socat |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2011-0098 2011-01-04 20:15:30 ------------------------------------------------------------------------------- -
Name : socat Product : Fedora 14 Version : 1.7.1.3 Release : 1.fc14 URL : http://www.dest-unreach.org/socat Summary : Bidirectional data relay between two data channels ('netcat++') Description : Socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device (serial line etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU line editor (readline), a program, or a combination of two of these. The compat-readline5 library is used to avoid GPLv2 vs GPLv3 issues.
------------------------------------------------------------------------------- - Update Information:
- Upgrade to 1.7.1.3 - Includes fix for CVE-2010-2799 Stack overflow by lexical scanning of nested character patterns - Resolves https://bugzilla.redhat.com/show_bug.cgi?id=620430
------------------------------------------------------------------------------- - ChangeLog:
* Mon Aug 23 2010 Paul Wouters <paul@xelerance.com> - 1.7.1.3-1 - Upgrade to 1.7.1.3 - Includes fix for CVE-2010-2799 Stack overflow by lexical scanning of nested character patterns - Resolves https://bugzilla.redhat.com/show_bug.cgi?id=620430 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #620426 - CVE-2010-2799 Socat: Stack overflow by lexical scanning of nested character patterns https://bugzilla.redhat.com/show_bug.cgi?id=620426 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update socat' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|