ep's blog

Linux kernel vmsplice() local privilege escalation exploit

http://secunia.com/advisories/28835/ - A bug in the vmsplice() call in the Linux kernel can allow a local user to escalate privileges to root. Sample code is available and has been verified as working. This bug affects kernel version 2.6.17 -, although the privilege escalation only works in the extended version of vmsplice() in 2.6.23 - 2.6.24. A patch partially fixing the bug is available in

Mac OS 10.5.1 update released

http://docs.info.apple.com/article.html?artnum=307004 - The Block all incoming connections setting for the Application Firewall allows any process running as user root (UID 0) to receive incoming connections, and also allows mDNSResponder to receive connections. This could result in the unexpected exposure of network services, as the original description is misleading. Please take this into account when locking down your OS 10.5 system.

Integer overflow in gpdf could allow for malicious code execution in PDFs

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387 - gpdf is used in various programs including (1) poppler, (2) xpdf, (3) kpdf, (4) kdegraphics, (5) CUPS and (6) tetex, and others. This vulnerability is in gpdf prior to version 2.8.2. Please check with your OS provider for updates of any programs with the ability to read PDFs.