Gentoo Archives: gentoo-security

From: Matt Poletiek <chill550@×××××.com>
To: gentoo-security@l.g.o
Subject: Re: [gentoo-security] Linux Kernel Local Root Exploit
Date: Mon, 11 Feb 2008 16:30:13
Message-Id: 1d624cdd0802110829r61abc57fn7b55d1ccdb22516f@mail.gmail.com
In Reply to: Re: [gentoo-security] Linux Kernel Local Root Exploit by Michael W Spitzer
1 This doesnt bypass Trusted Path Execution does it?
2 If not, is it safe to say users in that special group can still be trusted?
3
4 On Feb 11, 2008 9:19 AM, Michael W Spitzer <mwspitzer@×××××.com> wrote:
5 >
6 > On Feb 11, 2008 10:09 AM, Dominik Paulus <dominik@××××××××.de> wrote:
7 >
8 > >
9 > > Octavio Ruiz wrote:
10 > > > Any concert about the Linux Kernel Local Root Exploit as showed in the
11 > > > Common Vulnerabilities and Exposure site with id's CVE-2008-0009,
12 > > > CVE-2008-0010, CVE-2008-0600?
13 > > >
14 > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0009
15 > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
16 > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
17 > > >
18 > > > gentoo-sources and vanilla-sources are affected among probably others.
19 > >
20 > > See http://bugs.gentoo.org/show_bug.cgi?id=209460
21 > >
22 > >
23 > >
24 > > --
25 > > gentoo-security@l.g.o mailing list
26 > >
27 > >
28 >
29 > There's also a quick rundown here:
30 > http://www.reactivated.net/weblog/archives/2008/02/critical-linux-kernel-vmsplice-security-issues/
31 >
32 --
33 gentoo-security@l.g.o mailing list