"A new flaw in the latest release of the Linux
kernel<http://threatpost.com/blogs/researcher-uses-new-linux-kernel-flaw-bypass-selinux-other-protections>
gives
attackers the ability to exploit NULL pointer dereferences and bypass the
protections of SELinux, AppArmor and the Linux Security Module. Brad
Spengler discovered the vulnerability and found a reliable way to exploit
it, giving him complete control of the remote machine. This is somewhat
similar to the magic that Mark Dowd performed last year to exploit Adobe
Flash <http://tech.slashdot.org/article.pl?sid=08/04/18/0436232&tid=952>.
Threatpost.com reports: 'The vulnerability is in the 2.6.30 release of the
Linux kernel, and in a message to the Daily Dave mailing list Spengler said
that he was able to exploit the flaw, which at first glance seemed
unexploitable. He said that he was able to defeat the protection against
exploiting NULL pointer dereferences on systems running SELinux and those
running typical Linux implementations.'"
Slashdot -->
http://it.slashdot.org/story/09/07/18/0136224/New-Linux-Kernel-Flaw-Allows-Null-Pointer-Exploits?from=rss

-- 
http://jangestre.blogpsot.com
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to