New Linux Kernel Vulnerability
Johannes B. Ullrich
jullrich at sans.org
Mon Mar 8 08:27:23 EST 2004
its actually an older issue (yes... confused me too for a while).
They just updated the advisory. 2.4.25 and 2.6.3 are 'safe'.
On Mon, 2004-03-08 at 08:17, David Kramer wrote:
> Posted on \. by CmdrTaco on Sunday March 07, @11:22AM
> from the well-thats-just-not-pleasant dept.
> Stop Or I'll Noop writes "Paul Starzetz writes, "A critical security
> vulnerability has been found in the Linux kernel memory management code
> inside the mremap(2) system call due to missing function return value check.
> This bug is completely unrelated to the mremap bug disclosed on 05-01-2003
> except concerning the same internal kernel function code." Full scoop here"
>
> http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt
>
>
> -------------------------------------------------------------------
> DDDD David Kramer http://thekramers.net
> DK KD "If I asked you where we were," said Arthur weakly, "would I
> DKK D regret it?" Ford stood up. "We're safe," he said. "We are
> DK KD in a small galley cabin," said Ford, in one of those
> DDDD spaceships of the Vogon Construction Fleet." "Ah." said
> Arthur, "this is obviously some strange usage of the word
> _safe_ that I wasn't previously aware of."
> Douglas Adams, "Hitchhiker's Guide to the Galaxy".
> _______________________________________________
> Discuss mailing list
> Discuss at blu.org
> http://www.blu.org/mailman/listinfo/discuss
--
CTO SANS Internet Storm Center http://isc.sans.org
phone: (617) 837 2807 jullrich at sans.org
contact details: http://johannes.homepc.org/contact.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://lists.blu.org/pipermail/discuss/attachments/20040308/c75b4333/attachment.sig>
More information about the Discuss
mailing list