
I was a bit confused before but now it is total Regards John ----- Original Message Follows -----
* depends on whether your distribution includes certain modules or not: ubuntu's kernel is not vulnerable, but most other distros are.
Curious, since this machine actually runs a fairly standard ubuntu install and clearly was vulnerable.
zcat(a)mandela:~$ cat /etc/lsb-release DISTRIB_ID=Ubuntu DISTRIB_RELEASE=7.10 DISTRIB_CODENAME=gutsy DISTRIB_DESCRIPTION="Ubuntu 7.10"
zcat(a)mandela:~$ uname -a Linux mandela 2.6.22-14-generic #1 SMP Fri Feb 1 04:59:50 UTC 2008 i686 GNU/Linux
_______________________________________________ wlug mailing list | wlug(a)list.waikato.ac.nz Unsubscribe: http://list.waikato.ac.nz/mailman/listinfo/wlug

On 11/02/2008, jaytee(a)clear.net.nz <jaytee(a)clear.net.nz> wrote:
I was a bit confused before but now it is total
Ubuntu, Debian, Slackware, Fedora and Redhat kernels are all vulnerable (assuming you are running a kernel between 2.6.17 and 2.6.24. Each distro has a bug filed with its distribution bug tracking system. -- simon

On 11/02/2008, jaytee(a)clear.net.nz <jaytee(a)clear.net.nz> wrote:
I was a bit confused before but now it is total Regards John
In short there's a bit of a bug in the linux kernel. You run the exploit program as a normal user and it gives you a root shell, no sudo, no root passwords. This is really bad for any machine that has ordinary user logins who aren't supposed to get access to root (eg hoiho, our WLUG server) Of course there's already a patch that fixes the bug, and I expect most distros will have an urgent security update by tomorrow if it isn't out there already.
participants (3)
-
Bruce Kingsbury
-
jaytee@clear.net.nz
-
Simon Green