the staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a debian developer...
Exploit code from lkml Andrea Arcangeli [EMAIL PROTECTED]
we just can't allow userspace
Hi HTere!
Please find the patch for this attached. It is against linux 2.2.20.
I have not tested it, but since the lcall7() code in 2.2.x is the
same as for 2.4.x, it should work. It is based on Linus's and Petr's
patch for 2.5.x and Alan Cox's 2.4.x
Best Regards,
Matthew Grant
--- linux
exploit on 2.2.x, and the machine locked
completely
I have not check 2.0.x, but given the staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a debian developer
) #
+ andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+ pushl %eax
+ popfl
movl %edx,EIP(%esp) # Now we move them to their normal places
movl %ecx,CS(%esp) #
movl %esp,%ebx
Best Regards,
Matthew Grant
developers, please fix it
properly!
Thanks heaps,
Matthew Grant
On Thu, 2003-03-20 at 09:34, Matthew Grant wrote:
Dear All,
The patch also breaks kill(2) on a process with signal number 0 - This
is used by a lot of monitoring programs running as one user ID to make
sure
, Matthew Grant wrote:
Hi There!
Sorry about making a racket, but I am posting this for the edification
of all, as there is a work around without breaking your server for this
one.
As you can read below, I have found that the patch on 2.4.x also BREAKS
kill() 2 when
to do NMU with new security system, or someone else can
look after it. Matthew? Steve?
Best Regards,
Matthew Grant
--
===
Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\
A Linux Network Guy
Grant
--
===
Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\
A Linux Network Guy /~~\^/~~\_/~\___/~~\/**\
===GPG KeyID: 2EE20270 FingerPrint:
8C2535E1A11DF3EA5EA19125BA4E790E2EE20270
the staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a debian developer...
Exploit code from lkml Andrea Arcangeli [EMAIL PROTECTED]
we just can't allow userspace
Hi HTere!
Please find the patch for this attached. It is against linux 2.2.20.
I have not tested it, but since the lcall7() code in 2.2.x is the
same as for 2.4.x, it should work. It is based on Linus's and Petr's
patch for 2.5.x and Alan Cox's 2.4.x
Best Regards,
Matthew Grant
--- linux
) #
+ andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+ pushl %eax
+ popfl
movl %edx,EIP(%esp) # Now we move them to their normal places
movl %ecx,CS(%esp) #
movl %esp,%ebx
Best Regards,
Matthew Grant
, Matthew Grant wrote:
Hi There!
Sorry about making a racket, but I am posting this for the edification
of all, as there is a work around without breaking your server for this
one.
As you can read below, I have found that the patch on 2.4.x also BREAKS
kill() 2 when
12 matches
Mail list logo