Mageia alert MGASA-2013-0302 (xinetd)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2013-0302: Updated xinetd package fixes security vulnerability | |
Date: | Thu, 10 Oct 2013 00:47:14 +0200 | |
Message-ID: | <20131009224714.6ECA748534@valstar.mageia.org> |
MGASA-2013-0302 - Updated xinetd package fixes security vulnerability Publication date: 09 Oct 2013 URL: http://advisories.mageia.org/MGASA-2013-0302.html Type: security Affected Mageia releases: 2, 3 CVE: CVE-2013-4342 Description: It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user (CVE-2013-4342). References: - https://bugs.mageia.org/show_bug.cgi?id=11406 - https://rhn.redhat.com/errata/RHSA-2013-1409.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342 SRPMS: - 3/core/xinetd-2.3.15-3.1.mga3 - 2/core/xinetd-2.3.15-1.1.mga2