Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)

From: Ben Green <ben_at_bristolwireless.net>
Date: Fri 17 May 2013 - 10:38:03 BST
Message-ID: <20130517103803.Horde.3RMtaEAXpR2CPG23aiCXYQ3@slackmail.co.uk>

Quoting Ben Green <ben@bristolwireless.net>:

> I'm rebuilding now with the relevant patch in place, a simple 1
> liner. I'll upload to the Psand repos in the morning.

Done, kernels now ready for download from the Psand repositories.
Who'd have thought 3 characters in the whole of the kernels source
code could cause such a fuss. Package and metapackage examples are as
follows:

Package: linux-image-vserver-3.2-beng
Version: 3.2.44-2.3.2.16+squeeze1

Package: linux-image-3.2.44-vs2.3.2.16-beng
Source: linux-source-3.2.44-vs2.3.2.16-beng
Version: 0.2+squeeze1

Note particularly the version number.

Cheers,
Ben
Received on Fri May 17 10:39:26 2013

[Next/Previous Months] [Main vserver Project Homepage] [Howto Subscribe/Unsubscribe] [Paul Sladen's vserver stuff]
Generated on Fri 17 May 2013 - 10:39:26 BST by hypermail 2.1.8