Re: [linux] Kernel Function Boundary Condition Vulnerabi...
это я был
Summary of changes from v2.4.23 to v2.4.24-rc1
============================================
...
<marcelo.tosatti:cyclades.com>:
o Andrea Arcangeli: malicious users of mremap syscall can gain priviledges
...
2.6.1 не содержит этой уязвимости (хотя 2.6.0 содержит)
Мне кажется, что цитировать bugtraq на форуме имеет смысл с задержкой в несколько часов, а не в 9 дней. В этому времени, все кому это важно уже узнали.
Оставить комментарий
Polina746
для общего развития, кто не подписан--------------------------------------------------------------------------------------------------------------------------------------
Linux Kernel do_mremap Function Boundary Condition Vulnerabi...
Relevant URL: http://www.securityfocus.com/bid/9356
Summary:
A vulnerability involving the do_mremap system function has been reported
in the Linux kernel, allowing for local privilege escalation.
The mremap(2) system call is used to resize and relocate Virtual Memory
Areas (VMA). It calls the kernel do_mremap function internally. Due to a
bounds checking issue within the function, it is possible for local
attackers to disrupt the operation of the kernel. It is reported that
this flaw may be exploited to create a malicious VMA of zero bytes in
length. The malicious VMA may disrupt other memory management operations
in the kernel, potentially causing system instability. Attack vectors
also exist that may permit a local attacker to gain root privileges.
This type of vulnerability will permit a remote attacker who has already
gained limited privileges on a host to fully compromise the system.
Because the 2.2 kernel series does not support the affected MREMAP_FIXED
flag, it is not reported to be prone to this issue.