lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 16 May 2012 15:34:29 +0900
From: Robert Kim App and Facebook Marketing <evdo.hsdpa@...il.com>
To: full-disclosure@...ts.grok.org.uk
Cc: debian-security-announce@...ts.debian.org
Subject: Re: [SECURITY] [DSA 2472-1] gridengine security
	update

Guys... Great! That's 2 of 3 issues!

Any eta on the previous bug reports? from my last email?


>
> Package        : gridengine
> Vulnerability  : privilege escalation
> Problem type   : remote
> Debian-specific: no
> CVE ID         : CVE-2012-0208
>
> Dave Love discovered that users who are allowed to submit jobs to a
> Grid Engine installation can escalate their privileges to root because
> the environment is not properly sanitized before creating processes.
>
> For the stable distribution (squeeze), this problem has been fixed in
> version 6.2u5-1squeeze1.
>
> For the unstable distribution (sid), this problem has been fixed in
> version 6.2u5-6.
>
> We recommend that you upgrade your gridengine packages.


-- 
Robert Q Kim
Social Media Agencies and Consultants
http://www.youtube.com/watch?v=cIFyEuGqdwI
2611 S Coast Highway
San Diego, CA 92007
310 598 1606

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ