From: | Matt Poletiek <chill550@×××××.com> | ||
---|---|---|---|
To: | gentoo-security@l.g.o | ||
Subject: | Re: [gentoo-security] Linux Kernel Local Root Exploit | ||
Date: | Mon, 11 Feb 2008 16:30:13 | ||
Message-Id: | 1d624cdd0802110829r61abc57fn7b55d1ccdb22516f@mail.gmail.com | ||
In Reply to: | Re: [gentoo-security] Linux Kernel Local Root Exploit by Michael W Spitzer |
1 | This doesnt bypass Trusted Path Execution does it? |
2 | If not, is it safe to say users in that special group can still be trusted? |
3 | |
4 | On Feb 11, 2008 9:19 AM, Michael W Spitzer <mwspitzer@×××××.com> wrote: |
5 | > |
6 | > On Feb 11, 2008 10:09 AM, Dominik Paulus <dominik@××××××××.de> wrote: |
7 | > |
8 | > > |
9 | > > Octavio Ruiz wrote: |
10 | > > > Any concert about the Linux Kernel Local Root Exploit as showed in the |
11 | > > > Common Vulnerabilities and Exposure site with id's CVE-2008-0009, |
12 | > > > CVE-2008-0010, CVE-2008-0600? |
13 | > > > |
14 | > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0009 |
15 | > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010 |
16 | > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600 |
17 | > > > |
18 | > > > gentoo-sources and vanilla-sources are affected among probably others. |
19 | > > |
20 | > > See http://bugs.gentoo.org/show_bug.cgi?id=209460 |
21 | > > |
22 | > > |
23 | > > |
24 | > > -- |
25 | > > gentoo-security@l.g.o mailing list |
26 | > > |
27 | > > |
28 | > |
29 | > There's also a quick rundown here: |
30 | > http://www.reactivated.net/weblog/archives/2008/02/critical-linux-kernel-vmsplice-security-issues/ |
31 | > |
32 | -- |
33 | gentoo-security@l.g.o mailing list |