On Sat, Feb 21, 2004 at 09:33:49AM -0800, Jesse Keating wrote:
> CAN-2004-0077:
> A flaw in return value checking in mremap() in the Linux kernel versions
> 2.4.24 and previous that may allow a local attacker to gain root
> privileges. No exploit is currently available; however this issue is
> exploitable.
--- Begin Message ---
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Re: [RHSA-2004:065-01] Updated kernel packages resolve security vulnerabilities
- From: Ulrich Keil <ulrich@xxxxxxxxxxxxx>
- Date: Wed, 18 Feb 2004 17:58:49 +0100
- Delivered-to: mailing list bugtraq@securityfocus.com
- Delivered-to: moderator for bugtraq@securityfocus.com
- Mail-followup-to: bugtraq@securityfocus.com
- Mailing-list: contact bugtraq-help@securityfocus.com; run by ezmlm
- User-agent: Mutt/1.4.1i
bugzilla@xxxxxxxxxx wrote:
> Paul Starzetz discovered a flaw in return value checking in mremap()
> in the Linux kernel versions 2.4.24 and previous that may allow a local
> attacker to gain root privileges. No exploit is currently available;
> ...
There is an Proof-of-concept exploit available:
http://www.derkeiler.com/Mailing-Lists/Securiteam/2004-02/0052.html
Ulrich Keil
--
http://www.derkeiler.com
PGP Fingerprint: 5FA4 4C01 8D92 A906 E831 CAF1 3F51 8F47 1233 9AAD
Public key available at http://www.derkeiler.com/uk/pgp-key.asc
--- End Message ---