Package: socat
Dear maintainer,
Recently you fixed one or more security problems and as a result you closed
this bug. These problems were not serious enough for a Debian Security
Advisory, so they are now on my radar for fixing in the following suites
through point releases:
squeeze (6.0.7) -
Package: socat
Severity: grave
Tags: security
Please see http://www.dest-unreach.org/socat/contrib/socat-secadv3.html
Cheers,
Moritz
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
found 672994 1.7.1.3-1
fixed 672994 1.7.1.3-1.3
fixed 672994 2.0.0~beta4-1.1
thanks
* Moritz Muehlenhoff muehlenh...@univention.de, 2012-05-15, 12:31:
Please see http://www.dest-unreach.org/socat/contrib/socat-secadv3.html
A heap based buffer overflow vulnerability has been found with data
Processing commands for cont...@bugs.debian.org:
found 672994 1.7.1.3-1
Bug #672994 [socat] CVE-2012-0219: buffer overflow
Marked as found in versions socat/1.7.1.3-1.
fixed 672994 1.7.1.3-1.3
Bug #672994 [socat] CVE-2012-0219: buffer overflow
Marked as fixed in versions socat/1.7.1.3-1.3.
4 matches
Mail list logo