Gentoo Archives: gentoo-server

From: Kerin Millar <kerin@×××××××××××××××.net>
To: gentoo-server@g.o
Subject: Re: [gentoo-server] Root exploit in virtually all 2.4 kernels ... fixed
Date: Thu, 04 Dec 2003 14:16:06
Message-Id: 1070569081.2426.404.camel@kerfy.r2r.local
In Reply to: Re: [gentoo-server] Root exploit in virtually all 2.4 kernels ... fixed by Ken Tossell
1 On Thu, 2003-12-04 at 19:56, Ken Tossell wrote:
2 > On Thu, 4 Dec 2003, Matthew Baxa wrote:
3 >
4 > > How recently is "very recently"?
5 >
6 > 2.4.23 is the first patched release.
7
8 True, in so far as the scope of that comment goes. But /not/ so from the
9 perspective of the Gentoo user who uses ebuilds as a method to obtain
10 kernel sources with which to build a kernel (and this is a Gentoo list,
11 after all)! Some might take this as meaning you need to run 2.4.23 or
12 higher.
13
14 Let me make it perfectly clear that every version of every single set of
15 kernel sources in ebuild now applies a patch to rectify the
16 vulnerability, if required. Even vanilla-sources-2.4.20 is now safe, for
17 example.
18
19 --Kerin Francis Millar

Replies

Subject Author
Re: [gentoo-server] Root exploit in virtually all 2.4 kernels ... fixed Andy Dustman <adustman@×××××××××.edu>