Re: [bitfolk] Local user privilege escalation, kernel 3.3 an…

Top Page
Author: Andy Smith
Date:  
To: announce
Subject: Re: [bitfolk] Local user privilege escalation, kernel 3.3 and beyond

Reply to this message
gpg: Signature made Sat Mar 2 06:17:35 2013 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hello,

On Sat, Mar 02, 2013 at 07:13:37AM +0100, Andreas Olsson wrote:
> On Sat, Mar 2, 2013, at 2:40, Andy Smith wrote:
> > A flaw in the Linux kernel introduced in 3.3 allows a local user to
> > crash the kernel or obtain root access. Those running new enough
> > distributions (notably including Ubuntu 12.04) are vulnerable, so
> > please check whether you need to update.
> >
> > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1763
> > http://lwn.net/Articles/540082/
>
> Sure about Ubuntu 12.04? It running a 3.2 kernel it really shouldn't be
> affected.


No, not sure; I was only going by:

    http://www.ubuntu.com/usn/usn-1749-1/


but I see that whilst it mentions 12.04, it also says Quantal (which
is 12.10).

Cheers,
Andy

--
http://bitfolk.com/ -- No-nonsense VPS hosting
_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce