You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A new approach was identified that should considerably simplify exploitation against sudo versions starting from 1.9.4: https://seclists.org/oss-sec/2021/q1/88
It might be worth checking it out and implementing it in your exploit.
The text was updated successfully, but these errors were encountered:
Thanks for the headsup. Do we know which distros besides Debian Bullseye shipped a sudo (at some point) that was vulnerable to the ineffective NO_ROOT_MAILER hardening?
A new approach was identified that should considerably simplify exploitation against sudo versions starting from 1.9.4:
https://seclists.org/oss-sec/2021/q1/88
It might be worth checking it out and implementing it in your exploit.
The text was updated successfully, but these errors were encountered: