Recently two problems have been found in the glibc suite, which could beused to trick setuid applications to run arbitrary code.
Comment
Recently two problems have been found in the glibc suite, which could beused to trick setuid applications to run arbitrary code.
A format string bug was recently discovered in screen which can be used to gain elevated privilages if screen is setuid.
Multiple security problems and a gpmctl vulnerability exists.
A number of possible buffer overruns were found in libraries includedin the affected packages. A denial-of-service vulnerability was also foundin the ksu program.
gpm-root (part of the gpm packge) fails to drop gid 0 priviledges when executing user commands.
50 queries. 8.75 mb Memory usage. 1.471 seconds.