|
Date: Tue, 30 Sep 2014 13:50:40 +0100 From: "Mark R Bannister" <mark@...seconsulting.co.uk> To: oss-security@...ts.openwall.com Subject: Re: Healing the bash fork > I discuss the setuid/setgid vulnerability at the following site,> including demonstrating how Florian's prefix/suffix patch provides > no protection:> > http://technicalprose.blogspot.co.uk/2014/09/shellshock-bug-third-vulnerability.html Please can we have a separate CVE for the setuid/setgid bash exploit? I think this attack vector deserves to be tracked properly, and we need to be clear on when and if someone chooses to provide a fix for it. Thanks, Mark.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.