Matthew Robinson <matt@fone-me.com> writes:
> Does anybody have any more information on the exploit? I'd like to know if I
> am running any of the software, etc.
The exploit suposedly was a local privilege escalation exploit using
the new core dump feature from 2.6.13+. Is has been fixed (among
others) in 2.6.17.4. Check the changelog for the official CAN number
of the exploit.
Stable kernels (2.6.8) aren't affected but testing/sid are.
MfG
Goswin