DEBIAN-CVE-2012-2653

Source
https://security-tracker.debian.org/tracker/CVE-2012-2653
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2012-2653.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2012-2653
Upstream
Published
2012-07-12T20:55:15Z
Modified
2025-09-19T06:12:13Z
Summary
[none]
Details

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.

References

Affected packages

Debian:11 / arpwatch

Package

Name
arpwatch
Purl
pkg:deb/debian/arpwatch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1a15-1.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / arpwatch

Package

Name
arpwatch
Purl
pkg:deb/debian/arpwatch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1a15-1.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / arpwatch

Package

Name
arpwatch
Purl
pkg:deb/debian/arpwatch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1a15-1.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / arpwatch

Package

Name
arpwatch
Purl
pkg:deb/debian/arpwatch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1a15-1.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}