> It checks CAP_SYS_MODULE nowadays. > > Which does not look good by the way, it is function of request_module(), > rather than of caller. Only the caller knows if the data is tainted. Thus only the caller can decide - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
- Local root exploit with kmod and modutils > 2.1.121 Keith Owens
- Local root exploit with kmod and modutils > 2.1.12... Keith Owens
- Re: Local root exploit with kmod and modutils >... Alan Cox
- Re: Local root exploit with kmod and modutils... kuznet
- Re: Local root exploit with kmod and modu... Alan Cox
- Re: Local root exploit with kmod and... kuznet
- Re: Local root exploit with kmod... Alan Cox
- Re: Local root exploit with ... kuznet
- [PATCH] Re: Local root explo... Xavier Bestel
- Re: Local root exploit with kmod and modutils... Keith Owens
- Re: Local root exploit with kmod and modutils > 2.... Adam J. Richter