|
Message-ID: <4A84BA14.6080305@kernel.sg> Date: Fri, 14 Aug 2009 09:12:52 +0800 From: Eugene Teo <eugeneteo@...nel.sg> To: oss-security@...ts.openwall.com Subject: CVE-2009-2692 kernel: uninit op in SOCKOPS_WRAP() leads to privesc Marcus Meissner wrote: > Apparently new root exploit from Brad, see his twitter: > http://twitter.com/spendergrsec > > The video is a bit sick in my opinion. > > Disclosed apparently next week. So, the cat is out of the bag. The exploit is available, but so is the patch. https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2692 http://git.kernel.org/linus/e694958388c50148389b0e9b9e9e8945cf0f1b98 Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.