[38804] in bugtraq
Re: Linux kernel ELF core dump privilege elevation
daemon@ATHENA.MIT.EDU (Greg KH)
Wed May 11 18:18:58 2005
Date: Wed, 11 May 2005 11:30:46 -0700
From: Greg KH <gregkh@suse.de>
Cc: security@isec.pl, linux-kernel@vger.kernel.org,
full-disclosure@lists.netsys.com, bugtraq@securityfocus.com,
vulnwatch@vulnwatch.org
Message-ID: <20050511183046.GA17112@kroah.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20050511181211.GA16652@kroah.com>
On Wed, May 11, 2005 at 11:12:11AM -0700, Greg KH wrote:
> On Wed, May 11, 2005 at 01:08:56PM +0200, Paul Starzetz wrote:
> > Hi,
> >
> > since it became clear from the discussion in January about the uselib()
> > vulnerability, that the Linux community prefers full, non-embargoed
> > disclosure of kernel bugs, I release full details right now. However to
> > follows at least some of the responsable disclosure rules, no exploit code will be
> > released. Instead, only a proof-of-concept code is released to demonstrate
> > the vulnerability.
>
> <snip>
>
> And here's a patch for 2.6 that is completly untested. I'll work on
> testing it today and if it works, we will release a new 2.6.11.y release
> with this fix in it.
>
> thanks,
>
> greg k-h
>
>
> Subject: possibly fix Linux kernel ELF core dump privilege elevation
>
> As noted by Paul Starzetz
>
> references CAN-something-I-need-to-go-look-up...
CAN-2005-1263 is the correct one. Sorry for being lazy and not looking
it up right away.
thanks,
greg k-h