Re: Linux Kernel 2.0.x/2.2.x local Denial of Service attack

From: Khimenko Victor (khim@sch57.msk.ru)
Date: Sun Jan 09 2000 - 10:51:30 EST


In <Pine.LNX.4.05.10001091602430.15243-200000@nb.in-berlin.de> Sebastian (scut@nb.in-berlin.de) wrote:

> The Linux kernel developers have been notified at the same time as the
> public Linux community, so a safe patch should be available real soon.

It's joke, right ? This particular problem is known for more then year, was
discussed MANY times @ linux-kernel and still there are no solution in
mainstream kernel :-((

P.S. Oh and it's not all story: you can use SysV shared memory support to make
exploit usable even if admin limited your memory usage ! It's also well-known
problem without solution in mainstream kernel :-(

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sat Jan 15 2000 - 21:00:14 EST