Linux Kernel Sendpage Local Privilege Escalation

newsbot

newsbot

RSS Feed
The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4

Weiterlesen...
 

Ähnliche Themen

Gentoo Linux Security Advisory 201209-25

Red Hat Security Advisory 2012-1505-01

Tor-ramdisk i686 UClibc-based Linux Distribution MIPS 20121127

Red Hat Security Advisory 2012-1207-01

Red Hat Security Advisory 2012-1208-01

Zurück
Oben