On 09/20/2010 04:47 PM, Paul Allen Newell wrote:
> On 9/20/10 11:24 AM, Takehiko Abe wrote:
>>> Explain how you could have possibly compiled it let
>>> alone run it.
>>>
>> Please don't.
>>
> +1 with a big smile
>
Guys, it's been public for a number of days already. You don't need any
a
Tom Horsley writes:
> On Tue, 21 Sep 2010 09:10:32 +1000
> Chris Smart wrote:
>
>> If you're running the free service from KSplice, you'd already be
>> protected - and without even rebooting your computer :-)
>>
>> http://blog.ksplice.com/2010/09/cve-2010-3081/
>
> Unless, of course, you think th
On Tue, 21 Sep 2010 09:10:32 +1000
Chris Smart wrote:
> If you're running the free service from KSplice, you'd already be
> protected - and without even rebooting your computer :-)
>
> http://blog.ksplice.com/2010/09/cve-2010-3081/
Unless, of course, you think that allowing dynamic modification
On Mon, Sep 20, 2010 at 10:06 PM, wrote:
> Story at
> http://www.h-online.com/security/news/item/Hole-in-Linux-kernel-provides-root-rights-Update-1081317.html
If you're running the free service from KSplice, you'd already be
protected - and without even rebooting your computer :-)
http://blog.k
On 9/20/10 11:24 AM, Takehiko Abe wrote:
>> Explain how you could have possibly compiled it let
>> alone run it.
>>
> Please don't.
>
+1 with a big smile
--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/ma
fiedo...@math.ohio-state.edu wrote:
> I compiled this, ran it and got a root shell. I am running:
> kernel-2.6.34.6-54.fc13.x86_64
The fix is already in the "updates-testing" repository and awaiting
karma from the QA folks.
# yum --enablerepo=updates-testing update kernel
This will give you a
> Explain how you could have possibly compiled it let
> alone run it.
Please don't.
--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guid
On 09/20/2010 04:06 PM, JD wrote:
> What is ORIG_RAX in the code?
> It is undefined! Explain how you could have possibly compiled it let
> alone run it.
It's an index into an array of 8-byte register values returned by the
ptrace API. It's defined in sys/reg.h:
$ grep ORIG_RAX /usr/include/sys
On 09/20/2010 05:06 AM, fiedo...@math.ohio-state.edu wrote:
> Story at
> http://www.h-online.com/security/news/item/Hole-in-Linux-kernel-provides-root-rights-Update-1081317.html
>
> There is a link to exploit code at:
> http://sota.gen.nz/compat2/robert_you_suck.c
>
> I compiled this, ran it and
On Mon, Sep 20, 2010 at 10:13 AM, Zbigniew Fiedorowicz
wrote:
> Further story:
> http://www.theregister.co.uk/2010/09/15/linux_kernel_regression_bug/
>
> This is a very serious problem which puts multiuser 64-bit Linux systems
> absolutely at the mercy of their least responsible users.
>
> I have
Further story:
http://www.theregister.co.uk/2010/09/15/linux_kernel_regression_bug/
This is a very serious problem which puts multiuser 64-bit Linux systems
absolutely at the mercy of their least responsible users.
I have filed a bug report:
https://bugzilla.redhat.com/show_bug.cgi?id=635675
Prio
Story at
http://www.h-online.com/security/news/item/Hole-in-Linux-kernel-provides-root-rights-Update-1081317.html
There is a link to exploit code at:
http://sota.gen.nz/compat2/robert_you_suck.c
I compiled this, ran it and got a root shell. I am running:
kernel-2.6.34.6-54.fc13.x86_64
--
user
12 matches
Mail list logo