Re: Kernel NULL pointer vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Friday 14 August 2009, Kai Schaetzl wrote:
> Marcus Moeller wrote on Fri, 14 Aug 2009 14:24:39 +0200:
> > The only workaroud that is known to me atm is to disable the affected
> > kernel modules (which should be handled with care as some of them may
> > provide necessary functionality in your operating environment):
>
> If vm.mmap_min_addr is > 0 you are also not affected, at least not by that
> exploit.

...Unless you have selinux enabled in any way (including permissive) since in 
this case selinux overrides the kernel setting and makes vm.mmap_min_addr==0.

/Peter

> http://www.h-online.com/security/Critical-vulnerability-in-the-Linux-
> kernel-affects-all-versions-since-2001--/news/114004
>
> CentOS 5 has it sent to 65536 by default. CentoS 4 should be vulnerable.
>
> Kai

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux