[CentOS] Root exploit in the wild

2008-02-10 Thread Frank Cox
https://bugzilla.redhat.com/show_bug.cgi?id=432251 Mentioned on Slashdot here: http://it.slashdot.org/article.pl?sid=08/02/10/2011257 Fedora bug report here: https://bugzilla.redhat.com/show_bug.cgi?id=432229 -- MELVILLE THEATRE ~ Melville Sask ~ http://www.melvilletheatre.com

Re: [CentOS] Root exploit in the wild

2008-02-10 Thread Ralph Angenendt
Frank Cox schrieb: https://bugzilla.redhat.com/show_bug.cgi?id=432251 Just to clarify it a little bit: These are *local* root exploits, so the enemy has to find a way to get a shell account on your box to escalate his privileges. I don't want to say that these exploits are harmless (well,

Re: [CentOS] Root exploit in the wild

2008-02-10 Thread Ralph Angenendt
Ralph Angenendt schrieb: https://bugzilla.redhat.com/show_bug.cgi?id=432251#c10 looks interesting though - if you need a patch at once. Or maybe not, there is a first report of the kernel throwing a general protection fault. If someone can test it - go ahead and report here ... Cheers,

Re: [CentOS] Root exploit in the wild

2008-02-10 Thread Ralph Angenendt
Ralph Angenendt schrieb: Warning: There's a dexploit-exploit out there (an exploit which looks if the kernel is exploitable and then disables vmsplice() - or at least tries to) - don't use that. It doesn't work on CentOS 5. The original exploit seems to crash xen-DomUs - the deexploit succeeds

Re: [CentOS] Root exploit in the wild

2008-02-10 Thread Christopher Chan
Frank Cox wrote: https://bugzilla.redhat.com/show_bug.cgi?id=432251 Mentioned on Slashdot here: http://it.slashdot.org/article.pl?sid=08/02/10/2011257 Fedora bug report here: https://bugzilla.redhat.com/show_bug.cgi?id=432229 Fix right here: