Date: Wed, 2 Dec 2015 21:50:23 +0000 From: halfdog <me@...fdog.net> To: oss-security@...ts.openwall.com Subject: User man Local Root Exploit/Linux Kernel setgid Directory Privilege Escalation/PAM Owner Check Weakness -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello List, Those three interlinked issues did not find complete discussion/solution in the past 3 month after reporting to Linux distributor, but there is silent approval for disclosure (for 2015-11-30). Send me a note, if someone else wants to take a look before that, otherwise I would post the links 2015-12-14. Kind regards, hd - -- http://www.halfdog.net/ PGP: 156A AE98 B91F 0114 FE88 2BD8 C459 9386 feed a bee -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlZfZ5YACgkQxFmThv7tq+5J/gCdHZmuqN896RkECGdonRMNS880 mTkAn0oy4dmLBdUbKv1gl+HhQyeZYKIV =0Udj -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.