| Summary: | socat new security issue CVE-2013-3571 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs |
| Version: | 3 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/552193/ | ||
| Whiteboard: | MGA2TOO MGA3-64-OK MGA3-32-OK MGA2-64-OK MGA2-32-OK | ||
| Source RPM: | socat-2.0.0-0.b5.2.mga3.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-05-27 02:46:11 CEST
Updated packages uploaded for Mageia 2, Mageia 3, and Cauldron. Advisory: ======================== Updated socat package fixes security vulnerability: Under certain circumstances an FD leak occurs and can be misused for denial of service attacks against socat running in server mode (CVE-2013-3571). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3571 http://www.dest-unreach.org/socat/contrib/socat-secadv4.html ======================== Updated packages in core/updates_testing: ======================== socat-1.7.2.2-1.mga2 socat-2.0.0-0.b6.1.mga3 from SRPMS: socat-1.7.2.2-1.mga2.src.rpm socat-2.0.0-0.b6.1.mga3.src.rpm Version:
Cauldron =>
3 In Mageia 2, the testcase adds in fd with "can't identify protocol", while in Mageia the, the added fd shows "protocol: TCP" I'll install the updates and test them shortly. CC:
(none) =>
davidwhodgins Testing complete on both arches, both releases. Could someone from the sysadmin team push the srpm socat-2.0.0-0.b6.1.mga3.src.rpm from Mageia 3 Core Updates Testing to Core Updates and the srpm socat-1.7.2.2-1.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: Updated socat package fixes security vulnerability: Under certain circumstances an FD leak occurs and can be misused for denial of service attacks against socat running in server mode (CVE-2013-3571). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3571 http://www.dest-unreach.org/socat/contrib/socat-secadv4.html https://bugs.mageia.org/show_bug.cgi?id=10305 Keywords:
(none) =>
validated_update Mandriva has issued an advisory for this today (May 29): http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2013:170/ URL:
(none) =>
http://lwn.net/Vulnerabilities/552193/ Packages have been pushed to updates. Status:
NEW =>
RESOLVED
Nicolas Vigier
2014-05-08 18:05:31 CEST
CC:
boklm =>
(none) |