Re: FW: i386 Linux kernel DoS - Affects 2.2.x and probably 2.0.x

2002-11-17 Thread Matthew Grant
the staleness of this code segment, it may also be affected. The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks fairly easy to do. Best Regards, Matthew Grant PS: I am a debian developer... Exploit code from lkml Andrea Arcangeli [EMAIL PROTECTED] we just can't allow userspace

[PATCH] for 2.2.x i386 Linux kernel DoS - Affects 2.2.x andprobably 2.0.x

2002-11-18 Thread Matthew Grant
Hi HTere! Please find the patch for this attached. It is against linux 2.2.20. I have not tested it, but since the lcall7() code in 2.2.x is the same as for 2.4.x, it should work. It is based on Linus's and Petr's patch for 2.5.x and Alan Cox's 2.4.x Best Regards, Matthew Grant --- linux

[PATCH] ALERT!! - 2.2.x i386 Linux kernel has DoS same as 2.4.x!!!!

2002-11-19 Thread Matthew Grant
exploit on 2.2.x, and the machine locked completely I have not check 2.0.x, but given the staleness of this code segment, it may also be affected. The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks fairly easy to do. Best Regards, Matthew Grant PS: I am a debian developer

[PATCH] ALERT!! - 2.2.x i386 Linux kernel has 2.4.x DoS!!!!

2002-11-19 Thread Matthew Grant
) # + andl $~(NT_MASK|TF_MASK|DF_MASK), %eax + pushl %eax + popfl movl %edx,EIP(%esp) # Now we move them to their normal places movl %ecx,CS(%esp) # movl %esp,%ebx Best Regards, Matthew Grant

Ptrace patch for 2.4.x BREAKS kill() 2 interesting effects for .pidand dot locking? (was Re: Ptrace hole / Linux 2.2.25)

2003-03-19 Thread Matthew Grant
developers, please fix it properly! Thanks heaps, Matthew Grant On Thu, 2003-03-20 at 09:34, Matthew Grant wrote: Dear All, The patch also breaks kill(2) on a process with signal number 0 - This is used by a lot of monitoring programs running as one user ID to make sure

Re: Ptrace patch for 2.4.x BREAKS kill() 2 interesting effects for.pid and dot locking? (was Re: Ptrace hole / Linux 2.2.25)

2003-03-19 Thread Matthew Grant
, Matthew Grant wrote: Hi There! Sorry about making a racket, but I am posting this for the edification of all, as there is a work around without breaking your server for this one. As you can read below, I have found that the patch on 2.4.x also BREAKS kill() 2 when

FIX: Chunk fix for Apache 1.3.24 i386 .deb + source .dsc and .diff.gz available.

2002-06-20 Thread Matthew Grant
to do NMU with new security system, or someone else can look after it. Matthew? Steve? Best Regards, Matthew Grant -- === Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\ A Linux Network Guy

Proposal for new Security subsection for non-US

2002-06-21 Thread Matthew Grant
Grant -- === Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\ A Linux Network Guy /~~\^/~~\_/~\___/~~\/**\ ===GPG KeyID: 2EE20270 FingerPrint: 8C2535E1A11DF3EA5EA19125BA4E790E2EE20270

Re: FW: i386 Linux kernel DoS - Affects 2.2.x and probably 2.0.x

2002-11-17 Thread Matthew Grant
the staleness of this code segment, it may also be affected. The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks fairly easy to do. Best Regards, Matthew Grant PS: I am a debian developer... Exploit code from lkml Andrea Arcangeli [EMAIL PROTECTED] we just can't allow userspace

[PATCH] for 2.2.x i386 Linux kernel DoS - Affects 2.2.x and probably 2.0.x

2002-11-18 Thread Matthew Grant
Hi HTere! Please find the patch for this attached. It is against linux 2.2.20. I have not tested it, but since the lcall7() code in 2.2.x is the same as for 2.4.x, it should work. It is based on Linus's and Petr's patch for 2.5.x and Alan Cox's 2.4.x Best Regards, Matthew Grant --- linux

[PATCH] ALERT!! - 2.2.x i386 Linux kernel has 2.4.x DoS!!!!

2002-11-19 Thread Matthew Grant
) # + andl $~(NT_MASK|TF_MASK|DF_MASK), %eax + pushl %eax + popfl movl %edx,EIP(%esp) # Now we move them to their normal places movl %ecx,CS(%esp) # movl %esp,%ebx Best Regards, Matthew Grant

Re: Ptrace patch for 2.4.x BREAKS kill() 2 interesting effects for .pid and dot locking? (was Re: Ptrace hole / Linux 2.2.25)

2003-03-19 Thread Matthew Grant
, Matthew Grant wrote: Hi There! Sorry about making a racket, but I am posting this for the edification of all, as there is a work around without breaking your server for this one. As you can read below, I have found that the patch on 2.4.x also BREAKS kill() 2 when