lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CADSYzsuh6jcYnAq47yrfdbhPZ6mz1XnO1xcv5FkAH8edEyd+Xw@mail.gmail.com> Date: Fri, 13 Jan 2017 07:34:51 -0200 From: Dawid Golunski <dawid@...alhackers.com> To: fulldisclosure@...lists.org Subject: [FD] Nginx (Debian-based + Gentoo distros) - Root Privilege Escalation [CVE-2016-1247 UPDATE] [Updated CVE-2016-1247 advisory] Nginx packages on Gentoo distros were also found vulnerable to Root Privilege Escalation (CVE-2016-1247) exploit I discovered last year. Updated advisory URL: https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html Gentoo notice: https://security.gentoo.org/glsa/201701-22 Follow: https://twitter.com/dawid_golunski for more vulns. Regards, Dawid Golunski https://legalhackers.com t: @dawid_golunski _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/