Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 338025 - 64-bit local root exploit when 32-bit execution is enabled
Summary: 64-bit local root exploit when 32-bit execution is enabled
Status: RESOLVED DUPLICATE of bug 337659
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
Depends on:
Reported: 2010-09-19 10:58 UTC by Richard Freeman
Modified: 2010-09-19 11:00 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Richard Freeman gentoo-dev 2010-09-19 10:58:41 UTC
Stable gentoo kernels are vulnerable to the exploit described in this kernel commit:

Apologies if there is already a bug tracking this, but I've seen mailing list traffic, blog posts, and slashdot articles, and no security bug.  

Rumor has it that fixes are in the tree:

Reproducible: Always

Steps to Reproduce:
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-09-19 11:00:51 UTC
There are two issues, tracked in bug 337659 and 337645 respectively.

*** This bug has been marked as a duplicate of bug 337659 ***