remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
{
"binaries": [
{
"binary_version": "3.10-1ubuntu1",
"binary_name": "libnet-remctl-perl"
},
{
"binary_version": "3.10-1ubuntu1",
"binary_name": "libremctl-dev"
},
{
"binary_version": "3.10-1ubuntu1",
"binary_name": "libremctl1"
},
{
"binary_version": "3.10-1ubuntu1",
"binary_name": "python-remctl"
},
{
"binary_version": "3.10-1ubuntu1",
"binary_name": "remctl-client"
},
{
"binary_version": "3.10-1ubuntu1",
"binary_name": "remctl-server"
},
{
"binary_version": "3.10-1ubuntu1",
"binary_name": "ruby-remctl"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "3.13-1+deb9u1",
"binary_name": "libnet-remctl-perl"
},
{
"binary_version": "3.13-1+deb9u1",
"binary_name": "libremctl-dev"
},
{
"binary_version": "3.13-1+deb9u1",
"binary_name": "libremctl1"
},
{
"binary_version": "3.13-1+deb9u1",
"binary_name": "php-remctl"
},
{
"binary_version": "3.13-1+deb9u1",
"binary_name": "python-remctl"
},
{
"binary_version": "3.13-1+deb9u1",
"binary_name": "remctl-client"
},
{
"binary_version": "3.13-1+deb9u1",
"binary_name": "remctl-server"
},
{
"binary_version": "3.13-1+deb9u1",
"binary_name": "ruby-remctl"
}
]
}