Date: Fri, 14 Sep 2012 20:21:27 +0200 From: Agostino Sarubbo <ago@...too.org> To: oss-security@...ts.openwall.com Subject: CVE request: bacula: Console ACL Bypass Hello, >From secunia advisory https://secunia.com/advisories/50535/ : The security issue is caused due to an error within the implementation of console ACLs, which can be exploited to gain access to certain restricted functionality and e.g. dump resources. The security issue is reported in versions prior to 5.2.11. Patch: http://sourceforge.net/projects/bacula/files/bacula/5.2.11/0001-Fix- bug-1932-director-crash.patch Can you assign a CVE for this issue? -- Agostino Sarubbo / ago -at- gentoo.org Gentoo/AMD64 Arch Security Liaison GPG: 0x7CD2DC5D [ CONTENT OF TYPE application/pgp-signature SKIPPED ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ