lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050511183046.GA17112@kroah.com>
Date: Wed, 11 May 2005 11:30:46 -0700
From: Greg KH <gregkh@...e.de>
To: unlisted-recipients:; (no To-header on input)
Cc: security@...c.pl, linux-kernel@...r.kernel.org,
	full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com,
	vulnwatch@...nwatch.org
Subject: Re: Linux kernel ELF core dump privilege elevation


On Wed, May 11, 2005 at 11:12:11AM -0700, Greg KH wrote:
> On Wed, May 11, 2005 at 01:08:56PM +0200, Paul Starzetz wrote:
> > Hi,
> > 
> > since it became clear from the discussion in January about the uselib() 
> > vulnerability, that the Linux community prefers full, non-embargoed 
> > disclosure of kernel bugs, I release full details right now. However to 
> > follows at least some of the responsable disclosure rules, no exploit code will be 
> > released. Instead, only a proof-of-concept code is released to demonstrate 
> > the vulnerability.
> 
> <snip>
> 
> And here's a patch for 2.6 that is completly untested.  I'll work on
> testing it today and if it works, we will release a new 2.6.11.y release
> with this fix in it.
> 
> thanks,
> 
> greg k-h
> 
> 
> Subject: possibly fix Linux kernel ELF core dump privilege elevation
> 
> As noted by Paul Starzetz
> 
> references CAN-something-I-need-to-go-look-up...

CAN-2005-1263  is the correct one.  Sorry for being lazy and not looking
it up right away.

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ