From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754766AbZHNNFo (ORCPT ); Fri, 14 Aug 2009 09:05:44 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753611AbZHNNFn (ORCPT ); Fri, 14 Aug 2009 09:05:43 -0400 Received: from barnes.cubic.ch ([78.46.44.112]:52336 "EHLO barnes.cubic.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753487AbZHNNFn (ORCPT ); Fri, 14 Aug 2009 09:05:43 -0400 X-Greylist: delayed 2017 seconds by postgrey-1.27 at vger.kernel.org; Fri, 14 Aug 2009 09:05:42 EDT Message-ID: <4A85593E.4070405@cubic.ch> Date: Fri, 14 Aug 2009 14:31:58 +0200 From: Tim Tassonis User-Agent: Thunderbird 2.0.0.22 (X11/20090608) MIME-Version: 1.0 To: linux-kernel@vger.kernel.org Subject: Fix for latest in stable? Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Is there already a fix for the latest local root exploit in stable? 2.6.30.4 is vulnerable and gives me a nice little root shell with this exploit: http://grsecurity.net/~spender/wunderbar_emporium.tgz Bye Tim