Back to bug 1827580

Who When What Removed Added
Stefan Cornelius 2020-04-27 15:01:39 UTC Priority medium low
Severity medium low
Stefan Cornelius 2020-04-27 15:41:13 UTC Depends On 1828372, 1828376
Uwe Knop 2020-06-05 11:58:36 UTC CC uwe.knop
Satyajit Das 2020-12-22 03:58:36 UTC CC sadas
Shekhar Raut 2021-02-02 08:18:47 UTC CC sraut
Krutika Kinge 2021-02-08 01:48:25 UTC CC kkinge
Rama Piddaparthy 2021-02-17 07:10:33 UTC CC rpiddapa
Andre Pitanga 2021-02-26 14:54:29 UTC CC garrett.abbott
CC apitanga, scorneli
Flags needinfo?(scorneli)
Prakash Ghadge 2021-03-09 01:36:04 UTC CC pghadge
Flags needinfo?(scorneli) needinfo?(apitanga)
Joe Orton 2021-03-09 16:05:56 UTC CC jorton
Yadnyawalk Tale 2021-03-09 18:21:14 UTC CC ytale
Andre Pitanga 2021-03-10 13:08:13 UTC Flags needinfo?(apitanga)
Stefan Cornelius 2021-03-11 09:29:45 UTC Flags needinfo?(scorneli) needinfo?(scorneli)
Clifford Perry 2021-03-11 10:11:15 UTC CC cperry
Eric Christensen 2021-03-30 15:45:15 UTC Doc Text A flaw was found in squid. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Red Hat Bugzilla 2022-02-15 05:24:08 UTC CC apitanga
Red Hat Bugzilla 2022-09-02 18:50:50 UTC CC sraut
Red Hat Bugzilla 2023-05-31 23:37:24 UTC CC cperry
Red Hat Bugzilla 2023-07-07 08:35:24 UTC Assignee security-response-team nobody

Back to bug 1827580