lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 30 Jan 2012 19:42:01 +0100 From: nicolas vigier <boklm@...s-attacks.org> To: full-disclosure@...ts.grok.org.uk Subject: Re: Advisory: sudo 1.8 Format String Vulnerability On Mon, 30 Jan 2012, Henri Salo wrote: > On Mon, Jan 30, 2012 at 02:56:26PM +0100, joernchen of Phenoelit wrote: > > Hi, > > > > FYI, see attached. > > > > cheers, > > > > joernchen > > -- > > joernchen ~ Phenoelit > > <joernchen@...noelit.de> ~ C776 3F67 7B95 03BF 5344 > > http://www.phenoelit.de ~ A46A 7199 8B7B 756A F5AC > > This seems to be CVE-2012-0809 and reported to Gentoo as https://bugs.gentoo.org/show_bug.cgi?id=401533 Fixed in Mageia 1 : https://bugs.mageia.org/show_bug.cgi?id=4348 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists