0005-CVE-2013-4342-xinetd-ignores-user-and-group-directiv.patch 1.1 KB

1234567891011121314151617181920212223242526272829
  1. From 91e2401a219121eae15244a6b25d2e79c1af5864 Mon Sep 17 00:00:00 2001
  2. From: Thomas Swan <thomas.swan@gmail.com>
  3. Date: Wed, 2 Oct 2013 23:17:17 -0500
  4. Subject: [PATCH] CVE-2013-4342: xinetd: ignores user and group directives for
  5. TCPMUX services
  6. Originally reported to Debian in 2005 <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324678> and rediscovered <https://bugzilla.redhat.com/show_bug.cgi?id=1006100>, xinetd would execute TCPMUX services without dropping privilege to match the service configuration allowing the service to run with same privilege as the xinetd process (root).
  7. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
  8. ---
  9. xinetd/builtins.c | 2 +-
  10. 1 file changed, 1 insertion(+), 1 deletion(-)
  11. diff --git a/xinetd/builtins.c b/xinetd/builtins.c
  12. index 3b85579..34a5bac 100644
  13. --- a/xinetd/builtins.c
  14. +++ b/xinetd/builtins.c
  15. @@ -617,7 +617,7 @@ static void tcpmux_handler( const struct server *serp )
  16. if( SC_IS_INTERNAL( scp ) ) {
  17. SC_INTERNAL(scp, nserp);
  18. } else {
  19. - exec_server(nserp);
  20. + child_process(nserp);
  21. }
  22. }
  23. --
  24. 2.20.1