The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.7.2.3-1ubuntu0.1~esm1", "binary_name": "socat" }, { "binary_version": "1.7.2.3-1ubuntu0.1~esm1", "binary_name": "socat-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.7.3.1-1", "binary_name": "socat" }, { "binary_version": "1.7.3.1-1", "binary_name": "socat-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.7.3.2-2ubuntu2", "binary_name": "socat" }, { "binary_version": "1.7.3.2-2ubuntu2", "binary_name": "socat-dbgsym" } ] }