| Summary: | net-misc/netkit-telnetd information disclosure (CAN-2005-0488) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Thierry Carrez (RETIRED) <koon> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | minor | ||
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Other | ||
| URL: | http://www.idefense.com/application/poi/display?id=260&type=vulnerabilities | ||
| Whiteboard: | B4 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Thierry Carrez (RETIRED)
2005-06-26 03:54:40 UTC
solar: could you have a look and confirm that we are indeed affected ? Maybe the Debian patchset already includes the old RH patch... I expect to be a little busy most of the week. If anybody else can take a peek that would be great. Being that we base our netkit on debs package and Ubuntu is based on deb we are probably ok. But I can't confirm right away. - Ubuntu Ubuntu supports and ships netkit-telnet, which has been patched to not disclose arbitrary environment variables for a long time now. The krb5 version is also available in the archive, however, it is unsupported and there will not be an official advisory for it. It will most likely be fixed by the community. AFAICT the info disclosure already fixed in that package. |