[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: AMD64 port compromised ?

Matthew Robinson <matt@fone-me.com> writes:

> Does anybody have any more information on the exploit? I'd like to know if I
> am running any of the software, etc.

The exploit suposedly was a local privilege escalation exploit using
the new core dump feature from 2.6.13+. Is has been fixed (among
others) in Check the changelog for the official CAN number
of the exploit.

Stable kernels (2.6.8) aren't affected but testing/sid are.


Reply to: