U radu programskog paketa Socat, distribuiranog s operacijskim sustavom Fedora 14, otkrivena je sigurnosna ranjivost. Socat (eng. SOcket CAT) je uslužni program nalik na Netcat. Ranjivost je uzrokovana prepisivanjem spremnika na stogu u funkciji "nestlex()" u datoteci "nestlex.c". Zlonamjernom korisniku takva situacija omogućuje pokretanje proizvoljnog programskog koda putem dugačkih argumenata u naredbenoj liniji. Budući da je dostupna nova inačica paketa u kojoj je spomenuta ranjivost uklonjena, korisnicima se savjetuje instalacija iste.

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-0098
2011-01-04 20:15:30
--------------------------------------------------------------------------------

Name        : socat
Product     : Fedora 14
Version     : 1.7.1.3
Release     : 1.fc14
URL         : http://www.dest-unreach.org/socat
Summary     : Bidirectional data relay between two data channels ('netcat++')
Description :
Socat is a relay for bidirectional data transfer between two independent data
channels. Each of these data channels may be a file, pipe, device (serial line
etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an
SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU
line editor (readline), a program, or a combination of two of these.
The compat-readline5 library is used to avoid GPLv2 vs GPLv3 issues.

--------------------------------------------------------------------------------
Update Information:

- Upgrade to 1.7.1.3
- Includes fix for CVE-2010-2799 Stack overflow by lexical scanning of nested
character patterns
- Resolves https://bugzilla.redhat.com/show_bug.cgi?id=620430 

--------------------------------------------------------------------------------
ChangeLog:

* Mon Aug 23 2010 Paul Wouters <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.1.3-1
- Upgrade to 1.7.1.3
- Includes fix for CVE-2010-2799 Stack overflow by lexical scanning of nested
  character patterns
- Resolves https://bugzilla.redhat.com/show_bug.cgi?id=620430
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #620426 - CVE-2010-2799 Socat: Stack overflow by lexical scanning
of nested character patterns
        https://bugzilla.redhat.com/show_bug.cgi?id=620426
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update socat' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Idi na vrh