zmi007
1
I’ve got 2 kernel updates since the local kernel root exploit has been published:
.: packet storm ]:. - http://packetstormsecurity.org/](http://packetstormsecurity.org/filedesc/robert_you_suck.c.html)
However, nothing changes, I still can use robert_you_suck.x as a replacement for passwordless sudo. >:(
uname -a
Linux pbox.home 2.6.34.7-0.2-desktop #1 SMP PREEMPT 2010-09-14 14:21:06 +0200 x86_64 x86_64 x86_64 GNU/Linux
term@pbox:~/Download/linux> ./robert_you_suck.x
resolved symbol commit_creds to 0xffffffff81078590
resolved symbol prepare_kernel_cred to 0xffffffff81078730
mapping at 3f80000000
UID 0, EUID:0 GID:0, EGID:0
pbox:~/Download/linux> whoami
root
pbox:~/Download/linux> exit
exit
^C
Is there any hope that something changes in near future?
Can’t see it as I have a id mismatch for novell login that I can’t be bothered fixing… But this implies it is in the bug tracker. fewt@blog:~$ _: IA32 System Call Entry Point Vulnerability as bug https://bugzilla.novell.com/show_bug.cgi?id=639708
–
Cheers Malcolm °¿° (Linux Counter #276890)
SUSE Linux Enterprise Desktop 11 (x86_64) Kernel 2.6.32.19-0.2-default
up 4 days 6:06, 2 users, load average: 0.64, 0.26, 0.16
GPU GeForce 8600 GTS Silent - Driver Version: 256.53