All of lore.kernel.org
 help / color / mirror / Atom feed
* Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link
@ 2003-03-19 14:22 Andrus Nomm
  2003-03-19 16:03 ` Alan Cox
  2003-03-19 21:10 ` Stuart MacDonald
  0 siblings, 2 replies; 5+ messages in thread
From: Andrus Nomm @ 2003-03-19 14:22 UTC (permalink / raw)
  To: linux-kernel

Sorry but it was intended for kernel developers and not for other haxors
;)

It is an linux kernel development team fault that they do not give any
direct instructions how to submit bug, now this eploit is very public
probably.

However, what is done, is done.



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link
  2003-03-19 14:22 Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link Andrus Nomm
@ 2003-03-19 16:03 ` Alan Cox
  2003-03-19 21:10 ` Stuart MacDonald
  1 sibling, 0 replies; 5+ messages in thread
From: Alan Cox @ 2003-03-19 16:03 UTC (permalink / raw)
  To: Andrus Nomm; +Cc: Linux Kernel Mailing List

On Wed, 2003-03-19 at 14:22, Andrus Nomm wrote:
> Sorry but it was intended for kernel developers and not for other haxors
> ;)
> 
> It is an linux kernel development team fault that they do not give any
> direct instructions how to submit bug, now this eploit is very public
> probably.

I wouldn't worry. There is a very public implementation of it on bugtraq
and a rather nicer portable one floating around too. 

Alan


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link
  2003-03-19 14:22 Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link Andrus Nomm
  2003-03-19 16:03 ` Alan Cox
@ 2003-03-19 21:10 ` Stuart MacDonald
  2003-03-19 23:17   ` Brad Laue
  1 sibling, 1 reply; 5+ messages in thread
From: Stuart MacDonald @ 2003-03-19 21:10 UTC (permalink / raw)
  To: Andrus Nomm, linux-kernel

From: "Andrus Nomm" <a.nomm@wap3.net>
> It is an linux kernel development team fault that they do not give any
> direct instructions how to submit bug, now this eploit is very public
> probably.

linux/REPORTING_BUGS

The irony is that the bug reporting process makes the bug public, so
you would've had the same result.

..Stu



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link
  2003-03-19 21:10 ` Stuart MacDonald
@ 2003-03-19 23:17   ` Brad Laue
  2003-03-20  1:58     ` Joshua Kwan
  0 siblings, 1 reply; 5+ messages in thread
From: Brad Laue @ 2003-03-19 23:17 UTC (permalink / raw)
  To: Stuart MacDonald; +Cc: Andrus Nomm, linux-kernel

Stuart MacDonald wrote:

>The irony is that the bug reporting process makes the bug public, so
>you would've had the same result.
>
>..Stu
>  
>
My problem is with the fix for 2.4.x; last I checked, XFree86 et al 
should not be surrounded by square brackets, such as is the case now:

brad      1625  0.0  0.5  3080 1448 ?        S    17:16   0:01 [fam]
root      1942  2.2 16.7 308692 42896 ?      S    17:16   1:21 [X]
brad      1968  0.0  0.6  3644 1720 ?        S    17:17   0:00 
[xscreensaver]

etc.

-- 
// -- http://www.BRAD-X.com/ -- //



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link
  2003-03-19 23:17   ` Brad Laue
@ 2003-03-20  1:58     ` Joshua Kwan
  0 siblings, 0 replies; 5+ messages in thread
From: Joshua Kwan @ 2003-03-20  1:58 UTC (permalink / raw)
  To: Brad Laue; +Cc: linux-kernel mailing list

[-- Attachment #1: Type: text/plain, Size: 1535 bytes --]

On Wed, Mar 19, 2003 at 06:17:48PM -0500, Brad Laue wrote:
> My problem is with the fix for 2.4.x; last I checked, XFree86 et al 
> should not be surrounded by square brackets, such as is the case now:

But .. does anything weird happen?
I've noticed it too; no big deal, everything is still running fine...

nobody   16966  0.0  0.8  4132 1120 ?        S    Mar18   0:00 [proftpd]
www-data 22277  0.0  0.6 137464 796 ?        S    Mar18   0:00 [apache]
www-data 22278  0.0  0.7 137424 1012 ?       S    Mar18   0:00 [apache]
www-data 22279  0.0  0.6 137424 864 ?        S    Mar18   0:00 [apache]
www-data 22280  0.0  0.9 137452 1216 ?       S    Mar18   0:00 [apache]
www-data 22281  0.0  0.5 137412 748 ?        S    Mar18   0:00 [apache]
www-data 22282  0.0  0.6 137448 772 ?        S    Mar18   0:00 [apache]
www-data 22333  0.0  0.6 137416 852 ?        S    Mar18   0:00 [apache]
www-data 29197  0.0  0.9 137420 1264 ?       S    05:48   0:00 [apache]
root      4799  0.1  1.4  6628 1820 ?        S    17:24   0:02 [sshd]
joshk     4801  0.0  1.2  3832 1644 pts/1    S    17:24   0:00 -bash
irc       4815  0.0  0.5  2996  680 ?        S    17:25   0:00 -slink 10 10 12 1
joshk     4821  0.9  2.9  6208 3804 pts/1    S    17:26   0:17 mutt
root      5123  5.0  1.4  6700 1848 ?        S    17:56   0:00 [sshd]
joshk     5125  9.0  1.2  3820 1632 pts/2    S    17:56   0:00 -bash
joshk     5128  0.0  0.5  2488  752 pts/2    R    17:56   0:00 ps aux

Regards,
Josh

-- 
New PGP public key: 0x27AFC3EE

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2003-03-20  1:47 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2003-03-19 14:22 Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link Andrus Nomm
2003-03-19 16:03 ` Alan Cox
2003-03-19 21:10 ` Stuart MacDonald
2003-03-19 23:17   ` Brad Laue
2003-03-20  1:58     ` Joshua Kwan

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.