First published: Mon Aug 14 2023(Updated: )
GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/inetutils | <2:1.9.4-11ubuntu0.2 | 2:1.9.4-11ubuntu0.2 |
ubuntu/inetutils | <2:2.2-2ubuntu0.1 | 2:2.2-2ubuntu0.1 |
ubuntu/inetutils | <2:2.4-2ubuntu1.1 | 2:2.4-2ubuntu1.1 |
<=2.4 | ||
GNU inetutils | <=2.4 | |
debian/inetutils | <=2:1.9.4-7+deb10u1<=2:1.9.4-7+deb10u2<=2:2.0-1+deb11u1<=2:2.4-2 | 2:2.4-3 |
https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40303 is a vulnerability in GNU inetutils through 2.4 that may allow privilege escalation due to unchecked return values of certain functions.
CVE-2023-40303 has a severity rating of 7.8 out of 10, which is considered high.
Versions up to and including GNU inetutils 2.4 are affected by CVE-2023-40303.
To fix CVE-2023-40303 on Debian, you should update the inetutils package to version 2:2.4-3 or higher.
More information about CVE-2023-40303 can be found at the following references: [https://ftp.gnu.org/gnu/inetutils/](https://ftp.gnu.org/gnu/inetutils/), [https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6](https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6), [https://lists.gnu.org/archive/html/bug-inetutils/2023-07/msg00000.html](https://lists.gnu.org/archive/html/bug-inetutils/2023-07/msg00000.html).