[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: root compromise on debian woody



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Joey Hess said:

> Well to choose one security hole at random out of dozens to hundreds
> that remain unfixed in woody's kernels, this one allows anyone to go from
> a normal user account to root:
> 
> CAN-2005-1263 [Linux kernel ELF core dump privilege escalation]
>         - kernel-source-2.6.11 2.6.11 2.6.11-4
>         - kernel-source-2.6.8 2.6.8-16
>         - kernel-source-2.4.27 2.4.27-10
> 
I'm a little confused on this. First, I don't see that 2.6.x or 2.4.27
is available in woody - at least from the debian.org packages page for
woody.

Also, are we saying that the stable (woody) debian is full of security
holes? Aren't kernel 'sploits fixed in security updates. I may just not
be reading correctly.
- --

/phil


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (MingW32)

iD8DBQFClxIFGbd/rBLcaFwRAuN+AKCN4FrE8CTcwuRrEanQI/6SrPQxiwCgli5P
x/G/bDYUVPRYsUg5Ki64kOY=
=cO5P
-----END PGP SIGNATURE-----



Reply to: