xinetd-CVE-2013-4342.patch 955 B

12345678910111213141516171819202122232425262728293031323334
  1. xinetd: CVE-2013-4342
  2. xinetd does not enforce the user and group configuration directives
  3. for TCPMUX services, which causes these services to be run as root
  4. and makes it easier for remote attackers to gain privileges by
  5. leveraging another vulnerability in a service.
  6. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4342
  7. the patch come from:
  8. https://bugzilla.redhat.com/attachment.cgi?id=799732&action=diff
  9. CVE: CVE-2013-4342
  10. Signed-off-by: Li Wang <li.wang@windriver.com>
  11. Upstream-Status: Backport
  12. ---
  13. xinetd/builtins.c | 2 +-
  14. 1 file changed, 1 insertion(+), 1 deletion(-)
  15. diff --git a/xinetd/builtins.c b/xinetd/builtins.c
  16. index 3b85579..34a5bac 100644
  17. --- a/xinetd/builtins.c
  18. +++ b/xinetd/builtins.c
  19. @@ -617,7 +617,7 @@ static void tcpmux_handler( const struct server *serp )
  20. if( SC_IS_INTERNAL( scp ) ) {
  21. SC_INTERNAL(scp, nserp);
  22. } else {
  23. - exec_server(nserp);
  24. + child_process(nserp);
  25. }
  26. }
  27. --
  28. 1.7.9.5