Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date:  Tue, 30 Sep 2014 13:50:40 +0100
From: "Mark R Bannister" <mark@...seconsulting.co.uk>
To: oss-security@...ts.openwall.com
Subject: Re: Healing the bash fork

> I discuss the setuid/setgid vulnerability at the following site,> including demonstrating how Florian's prefix/suffix patch provides
> no protection:>
> http://technicalprose.blogspot.co.uk/2014/09/shellshock-bug-third-vulnerability.html

Please can we have a separate CVE for the setuid/setgid bash exploit?  I think this attack vector deserves to be tracked properly, and we need to be clear on when and if someone chooses to provide a fix for it.

Thanks,
Mark.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.