Bugzilla – Bug 1202433
VUL-0: CVE-2022-24951: EternalTerminal: race condition allows local attacker to hijack IPC socket
Last modified: 2022-11-02 17:28:55 UTC
CVE-2022-24951 A race condition exists in Eternal Terminal prior to version 6.2.0 which allows a local attacker to hijack Eternal Terminal's IPC socket, enabling access to Eternal Terminal clients which attempt to connect in the future. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24951 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24951 https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-546v-59j5-g95q https://github.com/MisterTea/EternalTerminal/releases/tag/et-v6.2.0
already fixed in openSUSE:Factory but open for openSUSE:Backports:SLE-15-SP*
I think a version upgrade would make sense here. SR#SR#997668 to Factory to include CVE/bugnumbers and adding the switch to choose gcc for Leap versions Update to 6.2.1: openSUSE_Backports_SLE-15-SP3_Update SR#997669 openSUSE_Backports_SLE-15-SP4_Update SR#997670
This is an autogenerated message for OBS integration: This bug (1202433) was mentioned in https://build.opensuse.org/request/show/997668 Factory / EternalTerminal https://build.opensuse.org/request/show/997669 Backports:SLE-15-SP3 / EternalTerminal https://build.opensuse.org/request/show/997670 Backports:SLE-15-SP4 / EternalTerminal
openSUSE-SU-2022:10187-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1202432,1202433,1202434,1202435 CVE References: CVE-2022-24949,CVE-2022-24950,CVE-2022-24951,CVE-2022-24952 JIRA References: Sources used: openSUSE Backports SLE-15-SP3 (src): EternalTerminal-6.2.1-bp153.2.3.1
openSUSE-SU-2022:10185-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1202432,1202433,1202434,1202435 CVE References: CVE-2022-24949,CVE-2022-24950,CVE-2022-24951,CVE-2022-24952 JIRA References: Sources used: openSUSE Backports SLE-15-SP4 (src): EternalTerminal-6.2.1-bp154.2.3.1