On Mon, 20 Sep 2010 18:51:16 -0400 Jon wrote: > > Package: linux-2.6 > Version: 2.6.32-23 > Justification: root security hole > Severity: critical > Tags: security > > > The changelog says the CVE-2010-3301 was fixed in this update: > * x86-64, compat (CVE-2010-3301): > - Retruncate rax after ia32 syscall entry tracing > - Test %rax for the syscall number, not %eax > > But a test of the exploit shows otherwise: > > n...@nobel:~(0)$ ./robert_you_suck > resolved symbol commit_creds to 0xffffffff8106914d > resolved symbol prepare_kernel_cred to 0xffffffff81069050 > mapping at 3f80000000 > UID 1000, EUID:1000 GID:100, EGID:100 > $
did you reboot? mike -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org