aboutsummaryrefslogtreecommitdiffstats
path: root/press.txt
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2012-01-22 20:43:41 +0100
committerJason A. Donenfeld <Jason@zx2c4.com>2016-02-21 20:48:51 +0100
commitc5868b6367d7de1cd83093a460538c6374ee644c (patch)
treea2735a702e08d75fd0fa6a47e03d21db7775aecc /press.txt
parentSome platforms don't support pipe2. (diff)
downloadCVE-2012-0056-c5868b6367d7de1cd83093a460538c6374ee644c.tar.xz
CVE-2012-0056-c5868b6367d7de1cd83093a460538c6374ee644c.zip
Import blog postHEADmaster
Diffstat (limited to 'press.txt')
-rw-r--r--press.txt83
1 files changed, 83 insertions, 0 deletions
diff --git a/press.txt b/press.txt
new file mode 100644
index 0000000..bc3d696
--- /dev/null
+++ b/press.txt
@@ -0,0 +1,83 @@
+Blog post: http://blog.zx2c4.com/749
+Code: http://git.zx2c4.com/CVE-2012-0056/tree/mempodipper.c
+
+>65,000 reads of the blog post.
+>800 tweets: https://twitter.com/#!/search/realtime/http%3A%2F%2Fblog.zx2c4.com%2F749
+
+Big deal posts:
+http://lwn.net/Articles/476947/
+http://lwn.net/SubscriberLink/476947/a53117b212412acb/
+http://www.pcworld.com/businesscenter/article/248669/linux_vendors_rush_to_patch_privilege_escalation_flaw_after_root_exploits_emerge.html
+http://lwn.net/Articles/476684/
+
+Random blog posts:
+http://www.infoworld.com/d/security/linux-vendors-rush-patch-privilege-escalation-flaw-after-root-exploits-emerge-184889
+http://www.theinquirer.net/inquirer/news/2141626/linux-vendors-urgently-patch-security-flaw
+http://www.matiasvangsnes.com/ubuntu/linux-root-exploit-due-to-memory-access-update-2/
+http://scalibq.wordpress.com/2012/01/24/another-root-exploit-for-linux/
+http://blogs.brandeis.edu/secureit/2012/01/25/linux-kernel-vulnerability-cve-2012-0056/
+http://www.varanoid.com/general/vu470151-linux-kernel-local-privilege-escalation-via-suid-procpidmem-write/
+http://codeinsecurity.wordpress.com/2012/01/27/linux-kernel-privilege-escalation-to-root/
+http://news.techeye.net/security/vendors-rush-to-patch-linux-flaw
+http://www.jupiterbroadcasting.com/16331/answers-for-everyone-techsnap-42/
+http://www.theprojectxblog.net/linux-root-exploit-vulnerability-cve-2012-0056/
+http://www.tux-planet.fr/linux-local-root-exploit-via-suid/
+http://www.h-online.com/open/news/item/Linux-root-exploit-due-to-memory-access-Update-2-1419834.html
+http://www.outflux.net/blog/archives/2012/01/22/fixing-vulnerabilities-with-systemtap/
+http://www.linuxfordevices.com/c/a/News/CVE20120056-patched/
+http://web.vniup.com/index.php/server/how-do-i-check-my-linux-kernel-against-root-exploits.html
+http://deranfangvomende.wordpress.com/2012/01/23/local-suid-in-linux/
+https://www.esiss.ac.uk/general/linux-local-root-exploit-2/
+http://linuxnews.me/?p=699
+http://chathux2.wordpress.com/2012/01/29/cve-2012-0056-linux-privilege-escalation-video-demonstration/
+http://hackersplay.com/cve-2012-0056-linux-privilege-escalation-video-demonstration/
+http://www.sluice.com.pk/linux-vendors-rush-to-patch-privilege-escalation-flaw-after-root-exploits-emerge/
+http://hackermuslim.com/2012/01/25/linux-vendors-rush-to-patch-privilege-escalation-flaw-after-root-exploits-emerge.html
+http://sbg.chaostreff.at/2012/01/nachstes-treffen-am-03-02-2012/
+http://blog.boxedice.com/2012/01/29/sysadmin-sunday-64/
+http://hosting.exactbot.com/news/2012/01/25/did-linus-jump-the-gun-on-a-kernel-security-fix/#.TyF21JOGYeA
+http://www.net-security.org/secworld.php?id=12294
+
+German:
+http://www.pc-magazin.de/news/gravierende-luecke-im-linux-kernel-entdeckt-1237672.html
+http://derstandard.at/1326503540797/Sicherheitsproblem-Linux-Kernel-Fehler-eroeffnet-Root-Rechte
+http://www.tuxxnet.de/fehler-im-linux-kernel-ermoglicht-root/
+http://www.heise.de/newsticker/meldung/Linux-Root-Rechte-durch-Speicherzugriff-1419608.html
+http://www.admin-magazin.de/News/Root-Exploit-fuer-Linux-Kernel-2.3.39-und-neuer
+http://tweakers.net/nieuws/79505/zwakte-in-geheugenbeheer-linux-maakt-root-toegang-mogelijk.html
+http://www.tecchannel.de/sicherheit/news/2038711/schwachstelle_im_linux_kernel/
+http://blog.embedded-system-design.de/?p=448
+http://www.golem.de/1201/89256.html
+
+Dutch:
+http://www.security.nl/artikel/40002/1/Ernstig_lek_in_Linux-kernel.html
+http://webwereld.nl/nieuws/109284/linux-fout-geeft-krakers-root-toegang.html
+
+Spanish:
+http://www.muylinux.com/2012/01/24/escalada-de-privilegios-remota-con-procpidmem-write/
+http://alswblog.org/2012/01/24/escalada-de-privilegios-con-procpidmem-write/
+http://ednolo.alumnos.upv.es/?p=529
+http://mundopc.net/elevacion-de-privilegios-en-el-kernel-linux-y-un-exploit-interesante/
+
+Russian:
+http://allunix.ru/2012/01/24/%D0%B2-%D1%8F%D0%B4%D1%80%D0%B5-linux-%D0%BD%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D0%B0-%D0%BB%D0%BE%D0%BA%D0%B0%D0%BB%D1%8C%D0%BD%D0%B0%D1%8F-root-%D1%83%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82/
+http://rosinvest.com/novosti/895464
+
+Italian:
+http://systemoveride.net/2012/01/23/linux-local-privilege-escalation-via-suid-procpidmem-write/
+
+Chinese:
+http://wp-awesome.rhcloud.com/2012/01/24/linux-local-root-cve-2012-0056/
+http://blog.haohtml.com/archives/12448
+http://bbs.chinaunix.net/thread-3666212-1-1.html
+http://www.haohtml.com/news/netsafe/47456.html
+
+French:
+http://www.silicon.fr/une-breche-de-securite-zero-day-est-ouverte-dans-le-noyau-linux-71125.html
+http://www.cedricthibault.fr/?p=171
+
+Indonesian:
+http://linuxbox.web.id/2012/01/27/exploit-root-linux-karena-akses-memori/
+
+Arabic:
+http://omanix09.wordpress.com/2012/02/02/%D8%AB%D8%BA%D8%B1%D8%A9-%D9%81%D9%83%D9%8A%D8%B1%D9%86%D9%84-%D8%A7%D9%84%D9%84%D9%8A%D9%86%D9%83%D8%B3-%D8%AA%D8%AA%D9%8A%D8%AD-%D9%84%D9%83-%D8%A7%D9%84%D8%AF%D8%AE%D9%88%D9%84-%D9%84%D9%84%D8%B1/