[arch-security] [ASA-201706-24] lxterminal-gtk3: access restriction bypass
Remi Gacogne
rgacogne at archlinux.org
Thu Jun 22 12:41:56 UTC 2017
Arch Linux Security Advisory ASA-201706-24
==========================================
Severity: Medium
Date : 2017-06-22
CVE-ID : CVE-2016-10369
Package : lxterminal-gtk3
Type : access restriction bypass
Remote : No
Link : https://security.archlinux.org/AVG-264
Summary
=======
The package lxterminal-gtk3 before version 0.3.0-2 is vulnerable to
access restriction bypass.
Resolution
==========
Upgrade to 0.3.0-2.
# pacman -Syu "lxterminal-gtk3>=0.3.0-2"
The problem has been fixed upstream but no release is available yet.
Workaround
==========
None.
Description
===========
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a
socket file, allowing a local user to cause a denial of service
(preventing terminal launch), or possibly have other impact (bypassing
terminal access control).
Impact
======
A local attacker might be able to cause a denial of service or bypass
the terminal access control to gain privileges or access sensitive
information.
References
==========
https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commitdiff;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648
https://unix.stackexchange.com/questions/333539/lxterminal-in-the-netstat-output/333578
https://bugs.debian.org/862098
https://security.archlinux.org/CVE-2016-10369
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170622/213f7d3a/attachment.asc>
More information about the arch-security
mailing list