lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 11 May 2005 11:30:46 -0700
From: Greg KH <>
To: unlisted-recipients:; (no To-header on input)
Subject: Re: Linux kernel ELF core dump privilege elevation

On Wed, May 11, 2005 at 11:12:11AM -0700, Greg KH wrote:
> On Wed, May 11, 2005 at 01:08:56PM +0200, Paul Starzetz wrote:
> > Hi,
> > 
> > since it became clear from the discussion in January about the uselib() 
> > vulnerability, that the Linux community prefers full, non-embargoed 
> > disclosure of kernel bugs, I release full details right now. However to 
> > follows at least some of the responsable disclosure rules, no exploit code will be 
> > released. Instead, only a proof-of-concept code is released to demonstrate 
> > the vulnerability.
> <snip>
> And here's a patch for 2.6 that is completly untested.  I'll work on
> testing it today and if it works, we will release a new 2.6.11.y release
> with this fix in it.
> thanks,
> greg k-h
> Subject: possibly fix Linux kernel ELF core dump privilege elevation
> As noted by Paul Starzetz
> references CAN-something-I-need-to-go-look-up...

CAN-2005-1263  is the correct one.  Sorry for being lazy and not looking
it up right away.


greg k-h

Powered by blists - more mailing lists