Bug 1039346

Summary: VUL-0: kernel-source: Qualys new root/setuid privilege escalation method 05-2017
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: bhavel, emu, heiko.rommel, hvdheuvel, jsegitz, mbenes, meissner, mlimardo, mpluskal, mrueckert, simonf.lees, tchvatal, vbabka, vcizek, vpelcak
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on: 1039348, 1039349, 1039354, 1044934    
Bug Blocks: 1037551    

Comment 6 Marcus Meissner 2017-05-23 11:57:26 UTC
Embargoe was changed to:

CRD: 2017-06-19
Comment 17 Marcus Meissner 2017-06-19 15:18:51 UTC
This problem has now been made public:

https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Comment 21 Marcus Meissner 2018-02-09 06:32:46 UTC
can close