Gentoo Logo
Gentoo Spaceship




Note: Due to technical difficulties, the Archives are currently not up to date. GMANE provides an alternative service for most mailing lists.
c.f. bug 424647
List Archive: gentoo-security
Navigation:
Lists: gentoo-security: < Prev By Thread Next > < Prev By Date Next >
Headers:
To: gentoo-security@g.o
From: "Matt Poletiek" <chill550@...>
Subject: Re: Linux Kernel Local Root Exploit
Date: Mon, 11 Feb 2008 09:29:24 -0700
This doesnt bypass Trusted Path Execution does it?
If not, is it safe to say users in that special group can still be trusted?

On Feb 11, 2008 9:19 AM, Michael W Spitzer <mwspitzer@...> wrote:
>
> On Feb 11, 2008 10:09 AM, Dominik Paulus <dominik@...> wrote:
>
> >
> > Octavio Ruiz wrote:
> > > Any concert about the Linux Kernel Local Root Exploit as showed in the
> > > Common Vulnerabilities and Exposure site with id's CVE-2008-0009,
> > > CVE-2008-0010, CVE-2008-0600?
> > >
> > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0009
> > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
> > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
> > >
> > > gentoo-sources and vanilla-sources are affected among probably others.
> >
> > See http://bugs.gentoo.org/show_bug.cgi?id=209460
> >
> >
> >
> > --
> > gentoo-security@g.o mailing list
> >
> >
>
> There's also a quick rundown here:
> http://www.reactivated.net/weblog/archives/2008/02/critical-linux-kernel-vmsplice-security-issues/
>
-- 
gentoo-security@g.o mailing list


References:
Linux Kernel Local Root Exploit
-- Octavio Ruiz
Re: Linux Kernel Local Root Exploit
-- Dominik Paulus
Re: Linux Kernel Local Root Exploit
-- Michael W Spitzer
Navigation:
Lists: gentoo-security: < Prev By Thread Next > < Prev By Date Next >
Previous by thread:
Re: Linux Kernel Local Root Exploit
Next by thread:
Re: Linux Kernel Local Root Exploit
Previous by date:
Re: Linux Kernel Local Root Exploit
Next by date:
[no subject]


Updated Jun 17, 2009

Summary: Archive of the gentoo-security mailing list.

Donate to support our development efforts.

Copyright 2001-2013 Gentoo Foundation, Inc. Questions, Comments? Contact us.