Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 30 Jan 2012 19:37:36 +0100
From: nicolas vigier <boklm@...s-attacks.org>
To: oss-security@...ts.openwall.com
Subject: Sudo format string vulnerability (CVE 2012-0809)

A vulnerability that can allow a user to run arbitrary commands as root :

http://www.sudo.ws/sudo/alerts/sudo_debug.html

http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ