Summary: | <x11-apps/xrdb-1.0.9 hostname command injection (CVE-2011-0465) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tomáš Chvátal (RETIRED) <scarabeus> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | x11 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tomáš Chvátal (RETIRED)
![]() (In reply to comment #0) > > @security: not sure what else you need to do with the bug so please pick > yourself. Thank you; got it. amd64 ok Arch teams, please test and mark stable: =x11-apps/xrdb-1.0.9 Target KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" (Adding a bit of boilerplate.) Stable for HPPA. x86 stable, thanks. arm stable alpha/ia64/s390/sh/sparc stable amd64 stable ppc/ppc64 stable, last arch done Thanks, everyone. GLSA request filed. CVE-2011-0465 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0465): xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message. This issue was resolved and addressed in GLSA 201412-09 at http://security.gentoo.org/glsa/glsa-201412-09.xml by GLSA coordinator Sean Amoss (ackle). |