|
|
Subscribe / Log in / New account

Mageia alert MGASA-2013-0302 (xinetd)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0302: Updated xinetd package fixes security vulnerability
Date:  Thu, 10 Oct 2013 00:47:14 +0200
Message-ID:  <20131009224714.6ECA748534@valstar.mageia.org>

MGASA-2013-0302 - Updated xinetd package fixes security vulnerability Publication date: 09 Oct 2013 URL: http://advisories.mageia.org/MGASA-2013-0302.html Type: security Affected Mageia releases: 2, 3 CVE: CVE-2013-4342 Description: It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user (CVE-2013-4342). References: - https://bugs.mageia.org/show_bug.cgi?id=11406 - https://rhn.redhat.com/errata/RHSA-2013-1409.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342 SRPMS: - 3/core/xinetd-2.3.15-3.1.mga3 - 2/core/xinetd-2.3.15-1.1.mga2


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds