lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <44B72421.9020804@randomvoids.com> Date: Fri Jul 14 05:57:54 2006 From: kyle at randomvoids.com (Kyle Lutze) Subject: Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround it seems that this relies on /etc/cron.d being there? or is it specific to a crond? I use fcron which doesn't use /etc/cron.d and I have been unable to get the exploit to successfully work. 2.6.14 kernel sh: /tmp/sh: No such file or directory I'm running gentoo-sources without selinux or anything else special for security. I tried changing it to cron.daily just to test and that doesn't work either. Kyle