lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Aug 2007 00:49:49 +0400 (MSD)
From: Dan Yefimov <>
To: Wojciech Purczynski <>
Subject: Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death
 Signal Vulnerability

On Tue, 14 Aug 2007, Wojciech Purczynski wrote:

> > I'm not sure this is a real security issue. If some process has the same
> > effective UID as the given one, the former can always send any signal to
> > the latter. Thus the behaviour you described is IMHO normal.
> It becomes a security issue whenever suid process drops user's UIDs.
But if it drops privileges (changes EUID back to RUID), it can't again send any 
signal to setuid process.

    Sincerely Your, Dan.

Powered by blists - more mailing lists