Re: We want to stop systemd from being added to docker images, because of rpm requiring systemctl.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Am 29.04.2014 21:36, schrieb Andrew Lutomirski:
> On Tue, Apr 29, 2014 at 12:33 PM, Reindl Harald <h.reindl@xxxxxxxxxxxxx> wrote:
>> simple example:
>>
>> * binary XYZ is vulerable for privilege escalation
> 
> This makes no sense...

for you

>> * we talk about a *local* exploit until now
> 
> ...I don't even know what you're trying to say here...

than google for

* "privilege escalation"
* "local exploit"
* "remote exploit"

that could be a good start:
http://en.wikipedia.org/wiki/Exploit_%28computer_security%29

>> * a bad configured webserver allows system-commands through a php-script
>>   and i consider that you google for the /e modifier
> 
> ...and this is already sufficient for a remote exploit.

yes, but the difference may be if you only can run unprivileged
code or have a chance to own the machine and get root

> Can we please move all discussion of "Zomg! This feature would take an
> existing security hole and turn it into a security hole with exactly
> the same impact" into its own thread or just stop it entirely?  All it
> does is distract from real discussion

can you please start to goole for things others talking about?

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux