2004-01-06 18:26:49

by Marcos D. Marado Torres

[permalink] [raw]
Subject: Linux mremap bug correction (fwd)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Look what I've just recieved...

It seems that 2.2 isn't vulnerable after all.

Mind Booster Noori

- --
==================================================
Marcos Daniel Marado Torres AKA Mind Booster Noori
/"\ http://student.dei.uc.pt/~marado
\ / [email protected]
X ASCII Ribbon Campaign
/ \ against HTML e-mail and Micro$oft attachments
==================================================

- ---------- Forwarded message ----------
Date: Tue, 6 Jan 2004 17:30:35 +0100 (CET)
From: Paul Starzetz <[email protected]>
Reply-To: [email protected]
To: [email protected], [email protected],
[email protected]
Subject: Linux mremap bug correction

Hi,

our initial posting contains a mistake about the vulnerability of the 2.2
kernel series. Since the 2.2 kernel series doesn't support the
MREMAP_FIXED flag it is NOT vulnerable. The source states
"MREMAP_FIXED option added 5-Dec-1999" but it didn't make into recent
2.2.x. We apologize for inconvenience.

- --
Paul Starzetz
iSEC Security Research
http://isec.pl/


- ------------ Output from gpg ------------
gpg: WARNING: using insecure memory!
gpg: please see http://www.gnupg.org/faq.html for more information
gpg: Signature made Tue 06 Jan 2004 04:30:40 PM WET using DSA key ID 9E70A6EE
gpg: Can't check signature: public key not found

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Made with pgp4pine 1.76

iD8DBQE/+v3SmNlq8m+oD34RAgF0AKDdqihpm5MWL2rxBvuwibehAoAEbACghemA
6wEeuJ/nEoWZpaSfUA0pDjU=
=VLWm
-----END PGP SIGNATURE-----