From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Fri, 8 Dec 2006 00:36:50 +0200 From: Michael Shigorin To: sysadmins@lists.altlinux.org Message-ID: <20061207223650.GQ21107@osdn.org.ua> Mail-Followup-To: sysadmins@lists.altlinux.org References: <20061207092813.GQ21076@osdn.org.ua> <200612071652.24949.a_s_y@sama.ru> Mime-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <200612071652.24949.a_s_y@sama.ru> User-Agent: Mutt/1.4.2.1i Subject: Re: [Sysadmins] SI: e100 => local kernel privilege escalation X-BeenThere: sysadmins@lists.altlinux.org X-Mailman-Version: 2.1.9rc1 Precedence: list Reply-To: shigorin@gmail.com, ALT Linux sysadmin discuss List-Id: ALT Linux sysadmin discuss List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 Dec 2006 22:36:51 -0000 Archived-At: List-Archive: On Thu, Dec 07, 2006 at 04:52:24PM +0400, Sergey wrote: > > A vulnerability exists in all PCI, PCI-X and PCIe Intel network > > adapter drivers that could allow unprivileged code executing on > > an affected system to perform a local privilege escalation. > "забавно". Этот "unprivileged code" просто в пролетающем пакете > может быть ? Если так, это просто праздник какой-то... local user, и vsu@ говорит, что посмотрел и сильно не уверен, что это exploitable. -- ---- WBR, Michael Shigorin ------ Linux.Kiev http://www.linux.kiev.ua/