Re: kernel 2.4.22 patch
[...] > > is there a kernel patch/update for the 'do_mremap VMA limit local > > privilege escalation vulnerability' described in > > http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ? > > That link provides the CVE identification CAN-2004-0077. > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0077 lists several > Debian security advisories related to this issue. [...] but these don't deal with 2.4.22 kernels only 2.4.16, 2.4.17 and 2.4.18 basti
kernel 2.4.22 patch
Hi, is there a kernel patch/update for the 'do_mremap VMA limit local privilege escalation vulnerability' described in http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ? i have the kernel 2.4.22-2-686-smp running and do security updates on a daily basis. But im still vulnerable, as checked with the programm in the appendix of the above page. So, is there a debian patch or how can i fix this situation. and if there is a patch, why did it not get installed with the regular security updates? thanks, basti
Re: kernel 2.4.22 patch
[...] > > is there a kernel patch/update for the 'do_mremap VMA limit local > > privilege escalation vulnerability' described in > > http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ? > > That link provides the CVE identification CAN-2004-0077. > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0077 lists several > Debian security advisories related to this issue. [...] but these don't deal with 2.4.22 kernels only 2.4.16, 2.4.17 and 2.4.18 basti -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
kernel 2.4.22 patch
Hi, is there a kernel patch/update for the 'do_mremap VMA limit local privilege escalation vulnerability' described in http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ? i have the kernel 2.4.22-2-686-smp running and do security updates on a daily basis. But im still vulnerable, as checked with the programm in the appendix of the above page. So, is there a debian patch or how can i fix this situation. and if there is a patch, why did it not get installed with the regular security updates? thanks, basti -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]