Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=dab87a21aa5b0b47f3ccd7be202ed467bea1429f

commit dab87a21aa5b0b47f3ccd7be202ed467bea1429f
Author: voroskoi <[EMAIL PROTECTED]>
Date:   Thu Sep 6 21:34:27 2007 +0200

FSA265-sudo

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index b4e28f8..749d57a 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,18 @@

<fsas>
<fsa>
+               <id>265</id>
+               <date>2007-09-06</date>
+               <author>voroskoi</author>
+               <package>sudo</package>
+               <vulnerable>1.6.8p12-3</vulnerable>
+               <unaffected>1.6.8p12-4terminus1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2373</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3149</cve>
+               <desc>A vulnerability has been reported in Sudo, which can be 
exploited by malicious, local users to bypass certain security restrictions.
+                       The vulnerability is caused due to improper error 
handling within the Kerberos 5 authentication mechanism. This can be exploited 
to execute commands allowed by the Sudo configuration without proper 
authentication.</desc>
+       </fsa>
+       <fsa>
<id>264</id>
<date>2007-09-06</date>
<author>voroskoi</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to