Get Gentoo! |
This doesnt bypass Trusted Path Execution does it?
If not, is it safe to say users in that special group can still be trusted?
On Feb 11, 2008 9:19 AM, Michael W Spitzer <mwspitzer@...> wrote:
> On Feb 11, 2008 10:09 AM, Dominik Paulus <dominik@...> wrote:
> > Octavio Ruiz wrote:
> > > Any concert about the Linux Kernel Local Root Exploit as showed in the
> > > Common Vulnerabilities and Exposure site with id's CVE-2008-0009,
> > > CVE-2008-0010, CVE-2008-0600?
> > >
> > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0009
> > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
> > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
> > >
> > > gentoo-sources and vanilla-sources are affected among probably others.
> > See http://bugs.gentoo.org/show_bug.cgi?id=209460
> > --
> > email@example.com mailing list
> There's also a quick rundown here:
firstname.lastname@example.org mailing list
Updated Jun 17, 2009
Archive of the gentoo-security mailing list.
Donate to support our development efforts.
Your browser does not support iframes.