Hi Mark,

In your first hexdump, this is what those values represent:

00013 = id of the device the tty is on
34816 = device id of the tty file
00003 = inode of the tty file
01000 = uid of the tty file
00005 = gid of the tty file
31291 = sid

The id of the device the tty is on is known. So is the uid and gid.
The device id of the tty file can be found in auth.log.

So that leaves the inode of the tty file and the sid.

You need to be able to open a new tty and hit the same tty number, the
same sid and the same inode, and you need to do it blindly without
knowing in advance what the inode and the sid were.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1219337

Title:
  Users can change the clock without authenticating, allowing them to
  locally exploit sudo.

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-control-center/+bug/1219337/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to