Summary: | <net-misc/x2goserver-4.0.0.2: arbitrary code execution as uid x2gouser (CVE-2013-4376) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Bernard Cafarelli <voyageur> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | nx |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://lists.berlios.de/pipermail/x2go-announcement/2013-May/000125.html | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Bernard Cafarelli
![]() With arches CC'ed it will be better sorry. Arches please test and mark stable: * net-misc/nx-3.5.0.20 * net-misc/x2goclient-4.0.1.0 (to test the server) * net-misc/x2goserver-4.0.0.2 (only recent package) Thanks! amd64 stable x86 stable Thanks ago! Vulnerable versions removed from tree GLSA request filed. This issue was resolved and addressed in GLSA 201310-19 at http://security.gentoo.org/glsa/glsa-201310-19.xml by GLSA coordinator Sergey Popov (pinkbyte). CVE-2013-4376 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4376): The setgid wrapper libx2go-server-db-sqlite3-wrapper.c in X2Go Server before 4.0.0.2 allows remote attackers to execute arbitrary code via unspecified vectors, relate to the path to libx2go-server-db-sqlite3-wrapper.pl. |