Sicherheit: Denial of Service in socat
Aktuelle Meldungen Distributionen
Name: Denial of Service in socat
ID: FEDORA-2013-9505
Distribution: Fedora
Plattformen: Fedora 17
Datum: Di, 11. Juni 2013, 12:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3571


Name        : socat
Product : Fedora 17
Version :
Release : 1.fc17
URL : http://www.dest-unreach.org/socat
Summary : Bidirectional data relay between two data channels
Description :
Socat is a relay for bidirectional data transfer between two independent data
channels. Each of these data channels may be a file, pipe, device (serial line
etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an
SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU
line editor (readline), a program, or a combination of two of these.
The compat-readline5 library is used to avoid GPLv2 vs GPLv3 issues.

Update Information:

Fix for CVE-2013-3571: Denial of service due to file descriptor leak

* Mon May 27 2013 Paul Wouters <pwouters@redhat.com> -
- Updated to for CVE-2013-3571, rhbz#967539
* Wed May 23 2012 Paul Wouters <pwouters@redhat.com> -
- Updated to for CVE-2012-0219, rhbz#821553, rhbz#821688
- Remove patch merged upstream
- Remove --disable-fips from configure

[ 1 ] Bug #967345 - CVE-2013-3571 socat: Denial of service due to file
descriptor leak

This update can be installed with the "yum" update program. Use
su -c 'yum update socat' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Twitter
Neue Nachrichten