Mailinglist Archive: opensuse-security (33 mails)

< Previous Next >
Re: [opensuse-security] Possible local root exploit in the kernel
  • From: Basil Chupin <blchupin@xxxxxxxxxx>
  • Date: Mon, 11 Feb 2008 22:52:40 +1100
  • Message-id: <47B03708.4030002@xxxxxxxxxx>
Rainer Duffner wrote:
Carlos E. R. schrieb:
The Sunday 2008-02-10 at 22:02 -0800, Crispin Cowan wrote:

It's a local exploit; the attacker has to already be logged into your
box to exploit it.
If you have hostile users logged into your box, and this patch is
urgent, then you have worse problems than this patch :-)
It has been suggested that an attacker might gain access through a
flash animation on a webpage, as normal user, and then scalate to root.

By default, OpenSuSE doesn't install Flash.
At least, 10.3 didn't here, but that may have to do with the fact that I
run x86_64...

Does it concern SLES, too, BTW?
I've no VM of it ATM, so I can't try.
RHEL5.1 just OOPSed, though.

True, but Firefox does install it (and others) when you go to site which requires Flash or others) before you can view anything of 'interest'.

As a follow-on, Firefox introduced/has an addon, an extension, called NoScript which anyone concerned with avoiding 'fire and brimstone' would immediately install.


If you want to know what a man is like, take a look at how he treats his
inferiors not his equals.

To unsubscribe, e-mail: opensuse-security+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security+help@xxxxxxxxxxxx

< Previous Next >
Follow Ups