Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 30 Jan 2012 19:37:36 +0100
From: nicolas vigier <boklm@...s-attacks.org>
To: oss-security@...ts.openwall.com
Subject: Sudo format string vulnerability (CVE 2012-0809)

A vulnerability that can allow a user to run arbitrary commands as root :

http://www.sudo.ws/sudo/alerts/sudo_debug.html

http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.