Re: kernel 2.4.22 patch

2004-03-19 Thread Sebastian Schmitt

[...]
> > is there a kernel patch/update for the 'do_mremap VMA limit local
> > privilege escalation vulnerability'  described in
> > http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
>
> That link provides the CVE identification CAN-2004-0077.
> 
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0077 lists several
> Debian security advisories related to this issue.
[...]

but these don't deal with 2.4.22 kernels  only 2.4.16, 2.4.17 and 
2.4.18

basti




kernel 2.4.22 patch

2004-03-19 Thread Sebastian Schmitt
Hi,

is there a kernel patch/update for the 
'do_mremap VMA limit local privilege escalation vulnerability'  described in
http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?

i have the kernel  2.4.22-2-686-smp running and do security updates on a daily 
basis.  But im still vulnerable, as checked with the programm in the appendix 
of the above page.
So, is there a debian patch or how can i fix this situation. and if there is a 
patch, why did it not get installed with the regular security updates?

thanks, basti




Re: kernel 2.4.22 patch

2004-03-19 Thread Sebastian Schmitt

[...]
> > is there a kernel patch/update for the 'do_mremap VMA limit local
> > privilege escalation vulnerability'  described in
> > http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
>
> That link provides the CVE identification CAN-2004-0077.
> 
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0077 lists several
> Debian security advisories related to this issue.
[...]

but these don't deal with 2.4.22 kernels  only 2.4.16, 2.4.17 and 
2.4.18

basti



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



kernel 2.4.22 patch

2004-03-19 Thread Sebastian Schmitt
Hi,

is there a kernel patch/update for the 
'do_mremap VMA limit local privilege escalation vulnerability'  described in
http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?

i have the kernel  2.4.22-2-686-smp running and do security updates on a daily 
basis.  But im still vulnerable, as checked with the programm in the appendix 
of the above page.
So, is there a debian patch or how can i fix this situation. and if there is a 
patch, why did it not get installed with the regular security updates?

thanks, basti



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]