[bitfolk] Local user privilege escalation, kernel 3.3 and be…

Top Page
Author: Andy Smith
Date:  
To: announce
Subject: [bitfolk] Local user privilege escalation, kernel 3.3 and beyond

Reply to this message
gpg: Signature made Sat Mar 2 01:40:24 2013 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hi,

A flaw in the Linux kernel introduced in 3.3 allows a local user to
crash the kernel or obtain root access. Those running new enough
distributions (notably including Ubuntu 12.04) are vulnerable, so
please check whether you need to update.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1763
http://lwn.net/Articles/540082/

Cheers,
Andy

--
http://bitfolk.com/ -- No-nonsense VPS hosting
_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce