*** This bug is a security vulnerability *** You have been subscribed to a public security bug by Marc Deslauriers (mdeslaur):
Trusty ships socat 1.7.2.3-1 which was last patched for CVE-2014-0019. There is a new(er) CVE-2015-1379 which affects all versions 1.7.2.4 and before, details see below. Even though it is rated Low IMO version 1.7.3.0-1 should be backported from Wily to fix this issue. ----8<---- http://www.dest-unreach.org/socat/contrib/socat-secadv6.txt ---- Socat security advisory 6 - Possible DoS with fork Overview socats signal handler implementations are not async-signal-safe and can cause crash or freeze of socat processes Vulnerability Id: CVE-2015-1379 Severity: Low Details Socats signal handler implementations are not asnyc-signal-safe. When a signal is triggered while the process is within a non async-signal-safe function the signal handler will call a non async-signal-safe function too. POSIX specifies the behaviour in this situation as undefined. Dependend on involved functions, libraries, and operating system, the process can continue, freeze, or crash. Mostly this issue occurs when socat is in listening mode with fork option and a couple of child processes terminate at the same time. Testcase none Affected versions 1.0.0.0 - 1.7.2.4 2.0.0-b1 - 2.0.0-b7 Not affected or corrected versions 1.7.3.0 and later 2.0.0-b8 and later Workaround none Download The updated sources can be downloaded from: http://www.dest-unreach.org/socat/download/socat-1.7.3.0.tar.gz http://www.dest-unreach.org/socat/download/socat-2.0.0-b8.tar.gz Credits Credits to Peter Lobsinger ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: socat 1.7.2.3-1 ProcVersionSignature: Ubuntu 3.19.0-31.36~14.04.1-generic 3.19.8-ckt7 Uname: Linux 3.19.0-31-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.16 Architecture: amd64 CurrentDesktop: KDE Date: Tue Oct 27 13:22:17 2015 InstallationDate: Installed on 2012-01-06 (1390 days ago) InstallationMedia: Kubuntu 11.10 "Oneiric Ocelot" - Release amd64 (20111011) SourcePackage: socat UpgradeStatus: Upgraded to trusty on 2014-08-16 (436 days ago) ** Affects: socat (Ubuntu) Importance: Undecided Status: Incomplete ** Tags: amd64 apport-bug trusty -- Possible DoS with fork in socat (CVE-2015-1379) https://bugs.launchpad.net/bugs/1510520 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
