Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S266013AbUAFAX4 (ORCPT ); Mon, 5 Jan 2004 19:23:56 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S266027AbUAFAX4 (ORCPT ); Mon, 5 Jan 2004 19:23:56 -0500 Received: from hosted-by.pins-web.net ([217.194.100.15]:41881 "EHLO katja.worldnetcenter.nl") by vger.kernel.org with ESMTP id S266013AbUAFAXy (ORCPT ); Mon, 5 Jan 2004 19:23:54 -0500 Subject: Re: 2.6.1-rc1 affected? From: Bastiaan Spandaw To: Tomas Szepe Cc: linux-kernel@vger.kernel.org In-Reply-To: <20040105224855.GC4987@louise.pinerecords.com> References: <1073320318.21198.2.camel@midux> <1073326471.21338.21.camel@midux> <20040105193817.GA4366@lsc.hu> <20040105224855.GC4987@louise.pinerecords.com> Content-Type: text/plain Message-Id: <1073348624.1790.43.camel@louise3.void.org> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.4.5 Date: Tue, 06 Jan 2004 01:23:44 +0100 Content-Transfer-Encoding: 7bit X-MailScanner-Information: Please contact the ISP for more information X-MailScanner: Found to be clean Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 741 Lines: 24 On Mon, 2004-01-05 at 23:48, Tomas Szepe wrote: > On Jan-05 2004, Mon, 20:38 +0100 > GCS wrote: > > > There _is_ an exploit: http://isec.pl/vulnerabilities/isec-0013-mremap.txt > > "Since no special privileges are required to use the mremap(2) system > ... > > I will not believe the claim until I've seen the code. Not sure if this works or not. According to a slashdot comment this is proof of concept code. http://linuxfromscratch.org/~devine/mremap_poc.c Regards, Bastiaan - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/