On Thu, 2012-10-04 at 13:56 +0100, Simon McVittie wrote:
CVE-2012-3524 (#689070) is a local root privilege escalation vulnerability
when setuid-root applications use libdbus without first sanitizing their
caller-supplied environment via a whitelist. Applications thought to be
exploitable
On 12/01/13 16:59, Adam D. Barratt wrote:
On Thu, 2012-10-04 at 13:56 +0100, Simon McVittie wrote:
CVE-2012-3524 (#689070) is a local root privilege escalation vulnerability
...
it looks like applying the patches to unstable /
testing was happily uneventful in terms of any issues arising in
Control: tags -1 + squeeze confirmed
On Sat, 2013-01-12 at 17:23 +, Simon McVittie wrote:
On 12/01/13 16:59, Adam D. Barratt wrote:
On Thu, 2012-10-04 at 13:56 +0100, Simon McVittie wrote:
CVE-2012-3524 (#689070) is a local root privilege escalation vulnerability
...
it looks like
On 12/01/13 17:29, Adam D. Barratt wrote:
On Sat, 2013-01-12 at 17:23 +, Simon McVittie wrote:
On 12/01/13 16:59, Adam D. Barratt wrote:
On Thu, 2012-10-04 at 13:56 +0100, Simon McVittie wrote:
CVE-2012-3524 (#689070) is a local root privilege escalation vulnerability
Control: tags -1 + pending
On Sat, 2013-01-12 at 20:50 +, Simon McVittie wrote:
On 12/01/13 17:29, Adam D. Barratt wrote:
On Sat, 2013-01-12 at 17:23 +, Simon McVittie wrote:
On 12/01/13 16:59, Adam D. Barratt wrote:
On Thu, 2012-10-04 at 13:56 +0100, Simon McVittie wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu
CVE-2012-3524 (#689070) is a local root privilege escalation vulnerability
when setuid-root applications use libdbus without first sanitizing their
caller-supplied environment via a whitelist.
6 matches
Mail list logo