Re: Kernel vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Jul 15, 2006 at 04:17:49PM -0400, Benjy Grogan wrote:
 > On 7/15/06, Dawid Gajownik <gajownik@xxxxxxxxx> wrote:
 > >Dnia 07/15/2006 07:03 AM, Użytkownik Dave Jones napisał:
 > >
 > >> There's another vulnerability that has been announced today, and
 > >> another -stable got pushed out this evening.
 > >
 > >You mean CVE-2006-3626? In this mail →
 > >http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047921.html
 > >they suggest mounting /proc as nosuid. Could this be done by default in
 > >FC6+ or does this break some things?
 > >
 > >BTW SELinux can stop this attack →
 > >http://www.redhat.com/archives/fedora-selinux-list/2006-July/msg00071.html
 > >:D
 > 
 > Wow.  That's great to know.  There should be a list of every security
 > vulnerability that SELinux has stopped or limited.  Maybe reported at
 > Fedoranews.org as they occur.  You rarely hear about when SELinux does
 > what it was designed for.

Additionally, this exploit only works with kernels compiled with support
for a.out style executables, which Fedora isn't.  I've got an update
building for 2.6.17.6 anyway, just to stop the inevitable "why hasn't Fedora
been patched" questions.

		Dave

-- 
http://www.codemonkey.org.uk

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux