100%
20.07.2009
An entry in the Internet Storm Center's Handler's Diary by Bojan Zdrnja entitled "A new fascinating Linux kernel vulnerability" describes the root exploit. The exploit code had been exposed by Brad ...
A recently discovered root exploit attacked the newest Linux versions and circumvented protection systems such as SELinux and AppArmor. A solution has been found.
... Root Exploit Vulnerability in Kernel 2.6.30
64%
16.04.2009
users can assume read privileges for a random device. If the device has a major and minor number of the root block device, invasive code can be applied to alter the system. A root exploit could ... channel between the kernel and program fails to authenticate, so that users can assume root privileges.
... Local Root Exploit in Udev
59%
15.05.2008
to the X server, the DRM layer and the Intel driver he was using. No changes were required for client programs.
The fact that the X Server on Linux runs with root privileges has led to malware ...
Red Hat's David Airlie reports in his blog that a simple hack allowed him to develop an X server without root privileges in the course of just one afternoon.
... X Server without Root Privileges?
56%
14.08.2009
thereby inflict some damage with code on the first page executed with root privileges. A precondition, however, is that the attacker already has code modification privileges as user, which precludes any ...
A Linux kernel bug in network socket initialization could allow an attacker to acquire root privileges to inflict damages. The security hole applies to all kernels of the 2.4 and 2.6 series and has
53%
06.11.2008
application. Using it to start a telnet daemon while in the system directory and then telneting from your PC into the phone's IP gives access to root, whereby all havoc can be raised.
The interesting thing ...
Hackers of the XDA Forum found a simple hack to gain access to root privileges on the Android platform of G1 mobile phones.
... Hackers Find Root Access to Android G1
46%
01.10.2019
to ZDNet, the new feature’s primary function will be to strengthen the divide between userland processes and kernel code – even the root user will have limited acces.
The feature will be disabled ...
The feature will let developers restrict root access to the kernel.
46%
01.07.2014
Redmond rushes in to root out alleged malware haven.
43%
12.01.2010
for filenames in case metadata is not available. Custom labels and moodbars are functions that couldn't initially find their way in the conversion from Amarok 1.4 to 2.0 but are now in 2.2.2. Details ...
The Amarok project has made version 2.2.2 of its KDE music player available for download. The new version includes a couple of new features next to many detail changes.
... Amarok 2.2.2 with New Features
39%
19.06.2009
Called Oceania, the maintenance v2.1.1 intends to make Amarok 2.1 better and more stable and according to Lydia Pintscher, could be the last release of the series. Changes include support for more ...
Development at Amarok is moving fast. Version 2.1.1 has only just been released and already programmers are working on the features of version 2.2.
... Amarok 2.1.1 Ready, 2.2 On The Way
38%
23.06.2010
Today at Verizon's Droid X event, Google's Andy Rubin announced that Android 2.2 (codename: Froyo) would launch for both OEMs and consumers at 2 p.m. EST. This allows companies to update from ...
Andy Rubin confirms that 2.2 is open-sourced and ready for OEMs and consumers.
... Android 2.2 Officially Available Today