From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261263AbUL1VyD (ORCPT ); Tue, 28 Dec 2004 16:54:03 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261262AbUL1VyD (ORCPT ); Tue, 28 Dec 2004 16:54:03 -0500 Received: from viper.oldcity.dca.net ([216.158.38.4]:36524 "HELO viper.oldcity.dca.net") by vger.kernel.org with SMTP id S261264AbUL1VyB (ORCPT ); Tue, 28 Dec 2004 16:54:01 -0500 Subject: Re: local root exploit confirmed in 2.6.10: Linux 2.6 Kernel Capability LSM Module Local Privilege Elevation From: Lee Revell To: linux-kernel In-Reply-To: <1104268915.20714.20.camel@krustophenia.net> References: <1104268915.20714.20.camel@krustophenia.net> Content-Type: text/plain Date: Tue, 28 Dec 2004 16:53:56 -0500 Message-Id: <1104270837.20714.39.camel@krustophenia.net> Mime-Version: 1.0 X-Mailer: Evolution 2.0.3 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2004-12-28 at 16:21 -0500, Lee Revell wrote: > http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2004-12/0390.html > Followup: this was discussed on the LSM list. Patch is available. http://mithra.immunix.com/pipermail/linux-security-module/2004-December/index.html Lee