| Summary: | sys-process/cronie, sys-process/vixie-cron: Possible privilege escalation | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | normal | CC: | cron-bugs+disabled, polynomial-c |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.openwall.com/lists/oss-security/2017/06/08/3 | ||
| Whiteboard: | B2 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Kristian Fiskerstrand (RETIRED)
2017-06-10 23:14:42 UTC
We have {sym,hard}link protection in place for gentoo-sources since bug 540006
Ping. @Maintainers are we still affected by this? Gentoo Security Padawan ChrisADR (In reply to Kristian Fiskerstrand from comment #1) > We have {sym,hard}link protection in place for gentoo-sources since bug > 540006 good to know this! it doesn't look to me like it affects us. Mitigated with fs.protected_hardlinks wrt bug #540006 |