generic-poky/meta/recipes-extended/xinetd
Li Wang a64da6a9b3 xinetd: CVE-2013-4342
xinetd does not enforce the user and group configuration directives
for TCPMUX services, which causes these services to be run as root
and makes it easier for remote attackers to gain privileges by
leveraging another vulnerability in a service.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4342

the patch come from:
https://bugzilla.redhat.com/attachment.cgi?id=799732&action=diff

(From OE-Core master rev: c6ccb09cee54a7b9d953f58fbb8849fd7d7de6a9)

(From OE-Core rev: 478b7f533c6664f1e4cab9950f257d927d32bb28)

Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Mark Hatle <mark.hatle@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-02-09 11:04:14 +00:00
..
xinetd xinetd: CVE-2013-4342 2014-02-09 11:04:14 +00:00
xinetd_2.3.15.bb xinetd: CVE-2013-4342 2014-02-09 11:04:14 +00:00