Bug#289155: CAN-2004-1235: uselib() privilege escalation

2005-01-12 Thread Horms
tag 289155 +pending thanks On Fri, Jan 07, 2005 at 03:23:30PM -0500, Joey Hess wrote: > clone 289155 -1 > reassign -1 kernel-source-2.4.27 > thanks > > Moritz Muehlenhoff wrote: > > I haven't found a patch for 2.6 yet, a patch for 2.4 is available in > > the 2.4 Bitkeeper branch. > > Cloning a b

Bug#289155: CAN-2004-1235: uselib() privilege escalation

2005-01-07 Thread Joey Hess
clone 289155 -1 reassign -1 kernel-source-2.4.27 thanks Moritz Muehlenhoff wrote: > I haven't found a patch for 2.6 yet, a patch for 2.4 is available in > the 2.4 Bitkeeper branch. Cloning a bug for 2.4 since it's also vulnerable. -- see shy jo signature.asc Description: Digital signature

Processed: Re: Bug#289155: CAN-2004-1235: uselib() privilege escalation

2005-01-07 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > clone 289155 -1 Bug#289155: CAN-2004-1235: uselib() privilege escalation Bug 289155 cloned as bug 289202. > reassign -1 kernel-source-2.4.27 Bug#289202: CAN-2004-1235: uselib() privilege escalation Bug reassigned from package `kernel-source-2.6

Bug#289155: CAN-2004-1235: uselib() privilege escalation

2005-01-07 Thread Norbert Tretkowski
tags 289155 +pending thanks * Moritz Muehlenhoff wrote: > Paul Starzetz from iSec Security Research has discovered a local > root exploit in the Linux kernel: Already fixed in svn. Norbert

Processed: Re: Bug#289155: CAN-2004-1235: uselib() privilege escalation

2005-01-07 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > tags 289155 +pending Bug#289155: CAN-2004-1235: uselib() privilege escalation Tags were: security Tags added: pending > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system adminis

Bug#289155: CAN-2004-1235: uselib() privilege escalation

2005-01-07 Thread Moritz Muehlenhoff
Package: kernel-source-2.6.8 Version: 2.6.8 Severity: grave Tags: security Justification: user security hole Paul Starzetz from iSec Security Research has discovered a local root exploit in the Linux kernel: > Locally exploitable flaws have been found in the Linux > binary format loaders' use