Re: Kernel exploit
- From: Ulick Magee <ulickatmaildotcom@xxxxxxxxxxxxxxx>
- Date: Wed, 22 Sep 2010 23:30:16 +0100
Kevin Miller wrote:
Attackers have used a freely available exploit to target a number of
64-bit Linux machines, according to a Linux patch management software firm.
The exploit is particularly pernicious, as it can leave a backdoor on
systems that have workarounds deployed, according to rebootless Linux
security update company Ksplice. The stack pointer underflow weakness
has been given a common vulnerability code of CVE-2010-3081.
A new kernel just came down the pike a few days ago. Does it not patch
No. According to the security summary report posted yesterday to the
opensuse-security-announce list, a fix for this is being prepared.
2) Pending Vulnerabilities, Solutions, and Work-Arounds
Vulnerabilities in the kernel were found that allow local users to
gain root privileges on 64bit systems. Updates for all supported
distributions are in the works (CVE-2010-3301, CVE-2010-3081).
Free software and free formats for free information for free people.
Open Office for Windows/OSX/Linux: http://www.openoffice.org
openSUSE Linux: http://en.opensuse.org
- Prev by Date: Re: Kernel exploit
- Next by Date: Re: Kernel exploit
- Previous by thread: Re: Kernel exploit
- Next by thread: Re: Kernel exploit