Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20110718173638.GC18284@redhat.com>
Date: Mon, 18 Jul 2011 11:36:39 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2011-2520: flaw in system-config-firewall's usage of pickle
 allows privilege escalation

Hi folks.  I'm not sure if anyone else uses system-config-firewall and
system-config-printer, but we had a report of a privilege escalation
flaw that could allow a user with access to run these commands to
elevate their privileges due to insecure use of the python pickle
module.

The solution is to use JSON rather than pickle.  The details and a patch
for CVE-2011-2520 are available in our bugzilla:

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2520

Thanks.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.