Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <50A2D8AE.3070708@gentoo.org>
Date: Tue, 13 Nov 2012 18:33:02 -0500
From: Sean Amoss <ackle@...too.org>
To: oss-security@...ts.openwall.com
Subject: Re: Privilege escalation (lpadmin -> root) in cups

On 11/11/2012 02:18 AM, Kurt Seifried wrote:

> 
> Please use CVE-2012-5519 for this issue. Also if other vendors could
> check the permissions/configs/etc. and reply if they are vulnerable
> that would be good.
> 
>> Regards,
> 

Gentoo is also vulnerable to this issue. Our bug for CVE-2012-5519:

https://bugs.gentoo.org/show_bug.cgi?id=442926

Thanks,

-- 
Sean Amoss
Gentoo Security | GLSA Coordinator
E-Mail	  : ackle@...too.org
GnuPG FP  : E58A AABD DD2D 03AF 0A7A 2F14 1877 72EC E928 357A


Download attachment "signature.asc" of type "application/pgp-signature" (295 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.