Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 14 Aug 2009 09:12:52 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
Subject: CVE-2009-2692 kernel: uninit op in SOCKOPS_WRAP() leads to privesc

Marcus Meissner wrote:
> Apparently new root exploit from Brad, see his twitter:
> http://twitter.com/spendergrsec
> 
> The video is a bit sick in my opinion.
> 
> Disclosed apparently next week.

So, the cat is out of the bag. The exploit is available, but so is the
patch.

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2692
http://git.kernel.org/linus/e694958388c50148389b0e9b9e9e8945cf0f1b98

Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.