On Thu, Mar 14, 2013 at 1:29 PM, Eric W. Biederman
wrote:
> Andy Lutomirski writes:
>
>> On 03/13/2013 11:35 AM, Eric W. Biederman wrote:
>>> Kees Cook writes:
>>>
Hi,
It seem like we should block (at least) this combination. On 3.9, this
exploit works once uidmapping is adde
Andy Lutomirski writes:
> On 03/13/2013 11:35 AM, Eric W. Biederman wrote:
>> Kees Cook writes:
>>
>>> Hi,
>>>
>>> It seem like we should block (at least) this combination. On 3.9, this
>>> exploit works once uidmapping is added.
>>>
>>> http://www.openwall.com/lists/oss-security/2013/03/13/10
On 03/13/2013 11:35 AM, Eric W. Biederman wrote:
> Kees Cook writes:
>
>> Hi,
>>
>> It seem like we should block (at least) this combination. On 3.9, this
>> exploit works once uidmapping is added.
>>
>> http://www.openwall.com/lists/oss-security/2013/03/13/10
>
> Yes. That is a bad combination
Kees Cook writes:
> Hi,
>
> It seem like we should block (at least) this combination. On 3.9, this
> exploit works once uidmapping is added.
>
> http://www.openwall.com/lists/oss-security/2013/03/13/10
Yes. That is a bad combination. It let's chroot confuse privileged
processes.
Now to figure
4 matches
Mail list logo