Matthew Robinson <matt@fone-me.com> writes: > Does anybody have any more information on the exploit? I'd like to know if I > am running any of the software, etc. The exploit suposedly was a local privilege escalation exploit using the new core dump feature from 2.6.13+. Is has been fixed (among others) in 2.6.17.4. Check the changelog for the official CAN number of the exploit. Stable kernels (2.6.8) aren't affected but testing/sid are. MfG Goswin