Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094):
vserver development mailing list
[
Next/Previous Months
] [
Main vserver Project Homepage
] [
Howto Subscribe/Unsubscribe
] [
Paul Sladen's vserver stuff
]
Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)
This message
: [
Message body
] [
More options
]
Related messages
: [
Next message
] [
Previous message
] [
In reply to
] [
Next in thread
] [
Replies
]
From
: Sergiusz Pawlowicz <
sergiusz_at_pawlowicz.name
>
Date
: Thu 16 May 2013 - 11:40:27 BST
Message-ID
: <CAPRDrAH5tNOg3sYChy81FrtLKiJWR4m+TPpoOfqKU55G4dm7pA@mail.gmail.com>
great, please remember about ubuntu kernels as well, ben!
s.
Received on
Thu May 16 11:41:15 2013
This message
: [
Message body
]
Next message
:
Ben Green: "Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)"
Previous message
:
Ben Green: "Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)"
In reply to
:
Ben Green: "Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)"
Next in thread
:
Ben Green: "Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)"
Reply
:
Ben Green: "Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)"
Contemporary messages sorted
: [
By Date
] [
By Thread
] [
By Subject
] [
By Author
] [
By messages with attachments
]
[
Next/Previous Months
] [
Main vserver Project Homepage
] [
Howto Subscribe/Unsubscribe
] [
Paul Sladen's vserver stuff
]
Generated on Thu 16 May 2013 - 11:41:15 BST by
hypermail 2.1.8