Hi Guillem,

Nice to read from you.

On Thu, Aug 17, 2023 at 01:19:34AM +0200, Guillem Jover wrote:
> Hi!
> 
> On Mon, 2023-08-14 at 20:42:10 +0200, Salvatore Bonaccorso wrote:
> > Source: inetutils
> > Version: 2:2.4-2
> > Severity: important
> > Tags: security upstream
> > X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> > <t...@security.debian.org>
> 
> > The following vulnerability was published for inetutils.
> > 
> > CVE-2023-40303[0]:
> > | GNU inetutils through 2.4 may allow privilege escalation because of
> > | unchecked return values of set*id() family functions in ftpd, rcp,
> > | rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the
> > | setuid system call fails when a process is trying to drop privileges
> > | before letting an ordinary user control the activities of the
> > | process.
> > 
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> Thanks! I had seen this in the upstream mailing list but did not think
> it was much of an issue for ftpd. But I've now cherry picked the patch
> locally, and included it as part of the next Debian package revision,
> which I need to polish a bit but will be uploading in a couple of days
> at most.

Ack, it is not super urgent I think, and note for bookworm and
bullseye we marked it as no-dsa. So while no DSA needed, if you have
time as well for the lower suites a fix might go into the upcoming
next point releases.

Regards,
Salvatore

Reply via email to