lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAEJizbYWCf6cWRJb_gh9nVWTXQyhHA552N69A-LWAnamMq+2Qg@mail.gmail.com> Date: Mon, 13 Aug 2012 15:20:43 +0100 From: Benji <me@...ji.com> To: Jann Horn <jannhorn@...glemail.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: The Android Superuser App Ok. On Mon, Aug 13, 2012 at 2:28 PM, Jann Horn <jannhorn@...glemail.com> wrote: > On Sun, Aug 12, 2012 at 09:47:57PM +0200, Jann Horn wrote: >> And finally, I've found another vuln that essentially lets apps gain root >> rights without asking the user, and I will release all details about it in >> two weeks. > > Found another independent vuln that also gives all apps root access, details > will go public in two weeks, too. > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists