| Summary: | sys_epoll_wait() Integer Overflow (CAN-2005-0736) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Jean-François Brunette (RETIRED) <formula7> |
| Component: | Kernel | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | major | CC: | security-kernel |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | All | ||
| URL: | http://secunia.com/advisories/14548/ | ||
| Whiteboard: | [linux >=2.6 < 2.6.11.2] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Jean-François Brunette (RETIRED)
2005-03-15 11:49:02 UTC
hardened-dev-sources-2.6.11-r1 is marked stable with .11.2 (base) From Ubuntu's latest: Georgi Guninski discovered an integer overflow in the sys_epoll_wait() function which allowed local users to overwrite the first few kB of physical memory. However, very few applications actually use this space (dosemu is a notable exception), but potentially this could lead to privilege escalation. (CAN-2005-0736) Mass-Ccing kern-sec@gentoo.org to make sure Kernel Security guys know about all of these... Fixed in gentoo-dev-sources-2.6.11-r4 mips-sources fixed. Fixed in usermode-sources-2.6.11 Fixed in ck-sources-2.6.11-r7 All fixed, closing bug. |