> request_module has the same effect as running suid. dev_load() can > take the interface name and pass it to modprobe unchanged and modprobe > does not verify its input, it trusts root/kernel. Then dev_load is being called the wrong way. In older kernels we explicitly only did a dev_load with user passed names providing suser() was true. Alan - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
- Local root exploit with kmod and modutils > 2.1.121 Keith Owens
- Local root exploit with kmod and modutils > 2.1.12... Keith Owens
- Re: Local root exploit with kmod and modutils >... Alan Cox
- Re: Local root exploit with kmod and modutils... kuznet
- Re: Local root exploit with kmod and modu... Alan Cox
- Re: Local root exploit with kmod and... kuznet
- Re: Local root exploit with kmod... Alan Cox
- Re: Local root exploit with ... kuznet
- [PATCH] Re: Local root explo... Xavier Bestel
- Re: Local root exploit with kmod and modutils... Keith Owens
- Re: Local root exploit with kmod and modutils > 2.... Adam J. Richter