https://bugzilla.redhat.com/show_bug.cgi?id=432251
Mentioned on Slashdot here:
http://it.slashdot.org/article.pl?sid=08/02/10/2011257
Fedora bug report here:
https://bugzilla.redhat.com/show_bug.cgi?id=432229
--
MELVILLE THEATRE ~ Melville Sask ~ http://www.melvilletheatre.com
Frank Cox schrieb:
https://bugzilla.redhat.com/show_bug.cgi?id=432251
Just to clarify it a little bit: These are *local* root exploits, so the
enemy has to find a way to get a shell account on your box to escalate
his privileges.
I don't want to say that these exploits are harmless (well,
Ralph Angenendt schrieb:
https://bugzilla.redhat.com/show_bug.cgi?id=432251#c10 looks
interesting though - if you need a patch at once.
Or maybe not, there is a first report of the kernel throwing a general
protection fault.
If someone can test it - go ahead and report here ...
Cheers,
Ralph Angenendt schrieb:
Warning: There's a dexploit-exploit out there (an exploit which looks
if the kernel is exploitable and then disables vmsplice() - or at least
tries to) - don't use that. It doesn't work on CentOS 5. The original
exploit seems to crash xen-DomUs - the deexploit succeeds
Frank Cox wrote:
https://bugzilla.redhat.com/show_bug.cgi?id=432251
Mentioned on Slashdot here:
http://it.slashdot.org/article.pl?sid=08/02/10/2011257
Fedora bug report here:
https://bugzilla.redhat.com/show_bug.cgi?id=432229
Fix right here:
5 matches
Mail list logo