, Matthew Grant wrote:
Hi There!
Sorry about making a racket, but I am posting this for the edification
of all, as there is a work around without breaking your server for this
one.
As you can read below, I have found that the patch on 2.4.x also BREAKS
kill() 2 when
ernel developers, please fix it
properly!
Thanks heaps,
Matthew Grant
On Thu, 2003-03-20 at 09:34, Matthew Grant wrote:
Dear All,
The patch also breaks kill(2) on a process with signal number 0 - This
is used by a lot of monitoring programs running as one user ID to make
s
, Matthew Grant wrote:
Hi There!
Sorry about making a racket, but I am posting this for the edification
of all, as there is a work around without breaking your server for this
one.
As you can read below, I have found that the patch on 2.4.x also BREAKS
kill() 2 when
ernel developers, please fix it
properly!
Thanks heaps,
Matthew Grant
On Thu, 2003-03-20 at 09:34, Matthew Grant wrote:
Dear All,
The patch also breaks kill(2) on a process with signal number 0 - This
is used by a lot of monitoring programs running as one user ID to make
s
(%esp) #
+ andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+ pushl %eax
+ popfl
movl %edx,EIP(%esp) # Now we move them to their "normal" places
movl %ecx,CS(%esp) #
movl %esp,%ebx
Best Regards,
an the follwing exploit on 2.2.x, and the machine locked
completely
I have not check 2.0.x, but given the staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a d
(%esp) #
+ andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+ pushl %eax
+ popfl
movl %edx,EIP(%esp) # Now we move them to their "normal" places
movl %ecx,CS(%esp) #
movl %esp,%ebx
Best Regards,
an the follwing exploit on 2.2.x, and the machine locked
completely
I have not check 2.0.x, but given the staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a d
Hi HTere!
Please find the patch for this attached. It is against linux 2.2.20.
I have not tested it, but since the lcall7() code in 2.2.x is the
same as for 2.4.x, it should work. It is based on Linus's and Petr's
patch for 2.5.x and Alan Cox's 2.4.x
Best Regards,
Matthew Gr
Hi HTere!
Please find the patch for this attached. It is against linux 2.2.20.
I have not tested it, but since the lcall7() code in 2.2.x is the
same as for 2.4.x, it should work. It is based on Linus's and Petr's
patch for 2.5.x and Alan Cox's 2.4.x
Best Regards,
Matthew Gr
staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a debian developer...
Exploit code from lkml Andrea Arcangeli <[EMAIL PROTECTED]>
> we just can't a
staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a debian developer...
Exploit code from lkml Andrea Arcangeli <[EMAIL PROTECTED]>
> we just can't a
gards,
Matthew Grant
--
=======
Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\
A Linux Network Guy /~~\^/~~\_/~\___/~~\/**\
===GPG KeyID: 2EE20270 FingerPrint:
8C2535E1A11DF3EA5EA19125B
do NMU with new security system, or someone else can
look after it. Matthew? Steve?
Best Regards,
Matthew Grant
--
===
Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\
A Linux Network Guy
Grant
--
===
Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\
A Linux Network Guy /~~\^/~~\_/~\___/~~\/**\
===GPG KeyID: 2EE20270 FingerPrint:
8C2535E1A11DF3EA5EA19125BA4E790E2EE20270
15 matches
Mail list logo