Bug 1039346 - VUL-0: kernel-source: Qualys new root/setuid privilege escalation method 05-2017
Summary: VUL-0: kernel-source: Qualys new root/setuid privilege escalation method 05-2017
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on: CVE-2017-1000364 CVE-2017-1000370 CVE-2017-1000365 CVE-2017-1000379
Blocks: 1037551
  Show dependency treegraph
 
Reported: 2017-05-16 15:16 UTC by Marcus Meissner
Modified: 2018-02-09 06:32 UTC (History)
15 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 6 Marcus Meissner 2017-05-23 11:57:26 UTC
Embargoe was changed to:

CRD: 2017-06-19
Comment 17 Marcus Meissner 2017-06-19 15:18:51 UTC
This problem has now been made public:

https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Comment 21 Marcus Meissner 2018-02-09 06:32:46 UTC
can close