Arch Linux Security Advisory ASA-201706-24 ========================================== Severity: Medium Date : 2017-06-22 CVE-ID : CVE-2016-10369 Package : lxterminal-gtk3 Type : access restriction bypass Remote : No Link : https://security.archlinux.org/AVG-264 Summary ======= The package lxterminal-gtk3 before version 0.3.0-2 is vulnerable to access restriction bypass. Resolution ========== Upgrade to 0.3.0-2. # pacman -Syu "lxterminal-gtk3>=0.3.0-2" The problem has been fixed upstream but no release is available yet. Workaround ========== None. Description =========== unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control). Impact ====== A local attacker might be able to cause a denial of service or bypass the terminal access control to gain privileges or access sensitive information. References ========== https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commitdiff;h=f99163c6ff... https://unix.stackexchange.com/questions/333539/lxterminal-in-the-netstat-ou... https://bugs.debian.org/862098 https://security.archlinux.org/CVE-2016-10369