openSUSE Security Update : socat (openSUSE-2015-324)

low Nessus Plugin ID 83083

Synopsis

The remote openSUSE host is missing a security update.

Description

socat was updated 1.7.2.4 to fix one security issue and bugs.

The following vulnerabilities were fixed :

- socats PROXY-CONNECT address was vulnerable to a buffer overflow with data from command line (CVE-2014-0019, boo#860991)

The following bugs were fixed :

- socat would frequently crash on ppc and armv7l (boo#927161)

- various other bug fixes in 1.7.2.4

Solution

Update the affected socat packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=860991

https://bugzilla.opensuse.org/show_bug.cgi?id=927161

Plugin Details

Severity: Low

ID: 83083

File Name: openSUSE-2015-324.nasl

Version: 2.3

Type: local

Agent: unix

Published: 4/27/2015

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Low

Base Score: 1.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:socat-debuginfo, cpe:/o:novell:opensuse:13.1, p-cpe:/a:novell:opensuse:socat, p-cpe:/a:novell:opensuse:socat-debugsource

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 4/16/2015

Reference Information

CVE: CVE-2014-0019