-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2917-1 security@debian.org http://www.debian.org/security/ Florian Weimer April 28, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : super CVE ID : CVE-2014-0470 John Lightsey of the Debian Security Audit project discovered that the super package did not check for setuid failures, allowing local users to increase the privileges on kernel versions which do not guard against RLIMIT_NPROC attacks. For the oldstable distribution (squeeze), this problem has been fixed in version 3.30.0-3+squeeze2. For the stable distribution (wheezy), this problem has been fixed in version 3.30.0-6+deb7u1. We recommend that you upgrade your super packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJTXpxNAAoJEL97/wQC1SS+NnMH/0PULLzFJFi88RG+dgQX14KC ZuozPr3ErdLaCIHAX5vWloUBZ4kQpz6cQInA0JFVcumrSb9Iq8W735ZWw53CGRzO 0iuUGjQ4xiLHYOpjkkH96SrjxuaUFCLHFgs2Ug1bKmkKlIIN2AX/KutLkdmzlQyo U3dGxsTdAg2K9gs7t65YK2RVeVD9z1lDMaqIFmK7lcL/4XR3nzrbhk7TIpMDYFi2 Qhq0Dgxv3RYqkGp1MSktZ0mFAnVG42PT2jqL6m4rL5wGsVLIYX0qHIT5vyZZpB/B RtRJTH9VEp+6XwCW+UAvTUIbJfFBCRl+QlnjdqECw6EqQhfOlvCdvNCpzeewXmE= =+Y+O -----END PGP SIGNATURE-----