Gentoo Archives: gentoo-security

From: Matt Poletiek <chill550@×××××.com>
To: gentoo-security@l.g.o
Subject: Re: [gentoo-security] Linux Kernel Local Root Exploit
Date: Mon, 11 Feb 2008 16:30:13
Message-Id: 1d624cdd0802110829r61abc57fn7b55d1ccdb22516f@mail.gmail.com
In Reply to: Re: [gentoo-security] Linux Kernel Local Root Exploit by Michael W Spitzer
This doesnt bypass Trusted Path Execution does it?
If not, is it safe to say users in that special group can still be trusted?

On Feb 11, 2008 9:19 AM, Michael W Spitzer <mwspitzer@×××××.com> wrote:
> > On Feb 11, 2008 10:09 AM, Dominik Paulus <dominik@××××××××.de> wrote: > > > > > Octavio Ruiz wrote: > > > Any concert about the Linux Kernel Local Root Exploit as showed in the > > > Common Vulnerabilities and Exposure site with id's CVE-2008-0009, > > > CVE-2008-0010, CVE-2008-0600? > > > > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0009 > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010 > > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600 > > > > > > gentoo-sources and vanilla-sources are affected among probably others. > > > > See http://bugs.gentoo.org/show_bug.cgi?id=209460 > > > > > > > > -- > > gentoo-security@l.g.o mailing list > > > > > > There's also a quick rundown here: > http://www.reactivated.net/weblog/archives/2008/02/critical-linux-kernel-vmsplice-security-issues/ >
-- gentoo-security@l.g.o mailing list