The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "socat", "binary_version": "1.7.2.3-1ubuntu0.1~esm1" }, { "binary_name": "socat-dbgsym", "binary_version": "1.7.2.3-1ubuntu0.1~esm1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "socat", "binary_version": "1.7.3.1-1" }, { "binary_name": "socat-dbgsym", "binary_version": "1.7.3.1-1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "socat", "binary_version": "1.7.3.2-2ubuntu2" }, { "binary_name": "socat-dbgsym", "binary_version": "1.7.3.2-2ubuntu2" } ] }