Issue |
132235
|
Summary |
SecurityGroup archive: Chromium issue 42410068 Using ASan with setuid binaries can lead to arbitrary file write and elevation of privileges
|
Labels |
SecurityArchive
|
Assignees |
|
Reporter |
smithp35
|
This is an archival issue from the Security Group's Chromium bug-tracker which has now been archived. Capturing the contents of the Chromium issue in a PDF in case link.
https://issuetracker.google.com/issues/42410068 (Previous URL https://bugs.chromium.org/p/llvm/issues/detail?id=73) Using ASan with setuid binaries can lead to arbitrary file write and elevation of privileges
Published in https://llvm.org/docs/SecurityTransparencyReports.html#id4
[Using ASan with setuid binaries can lead to arbitrary file write and elevation of privileges \[42410068\] - Issue Tracker.pdf](https://github.com/user-attachments/files/19369881/Using.ASan.with.setuid.binaries.can.lead.to.arbitrary.file.write.and.elevation.of.privileges.42410068.-.Issue.Tracker.pdf)
_______________________________________________
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs