remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
{
"binaries": [
{
"binary_name": "libnet-remctl-perl",
"binary_version": "3.10-1ubuntu1"
},
{
"binary_name": "libremctl-dev",
"binary_version": "3.10-1ubuntu1"
},
{
"binary_name": "libremctl1",
"binary_version": "3.10-1ubuntu1"
},
{
"binary_name": "python-remctl",
"binary_version": "3.10-1ubuntu1"
},
{
"binary_name": "remctl-client",
"binary_version": "3.10-1ubuntu1"
},
{
"binary_name": "remctl-server",
"binary_version": "3.10-1ubuntu1"
},
{
"binary_name": "ruby-remctl",
"binary_version": "3.10-1ubuntu1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libnet-remctl-perl",
"binary_version": "3.13-1+deb9u1"
},
{
"binary_name": "libremctl-dev",
"binary_version": "3.13-1+deb9u1"
},
{
"binary_name": "libremctl1",
"binary_version": "3.13-1+deb9u1"
},
{
"binary_name": "php-remctl",
"binary_version": "3.13-1+deb9u1"
},
{
"binary_name": "python-remctl",
"binary_version": "3.13-1+deb9u1"
},
{
"binary_name": "remctl-client",
"binary_version": "3.13-1+deb9u1"
},
{
"binary_name": "remctl-server",
"binary_version": "3.13-1+deb9u1"
},
{
"binary_name": "ruby-remctl",
"binary_version": "3.13-1+deb9u1"
}
]
}