User: Password:
|
|
Subscribe / Log in / New account

openSUSE alert openSUSE-SU-2012:0809-1 (socat)

From:  opensuse-security@opensuse.org
To:  opensuse-updates@opensuse.org
Subject:  openSUSE-SU-2012:0809-1: socat: Fixed a buffer overflow
Date:  Mon, 2 Jul 2012 18:08:24 +0200 (CEST)
Message-ID:  <20120702160824.AB3A432845@maintenance.suse.de>
Archive-link:  Article, Thread

openSUSE Security Update: socat: Fixed a buffer overflow ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:0809-1 Rating: low References: #759859 Cross-References: CVE-2012-0219 Affected Products: openSUSE 12.1 openSUSE 11.4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update of socat fixes a buffer overflow in READLINE output mode. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.1: zypper in -t patch openSUSE-2012-348 - openSUSE 11.4: zypper in -t patch openSUSE-2012-348 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.1 (i586 x86_64): socat-1.7.1.3-8.4.1 socat-debuginfo-1.7.1.3-8.4.1 socat-debugsource-1.7.1.3-8.4.1 - openSUSE 11.4 (i586 x86_64): socat-1.7.1.3-6.1 socat-debuginfo-1.7.1.3-6.1 socat-debugsource-1.7.1.3-6.1 References: http://support.novell.com/security/cve/CVE-2012-0219.html https://bugzilla.novell.com/759859


(Log in to post comments)


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds