Re: Kernel 2.4 ioperm
On 030523 at 13:20, Martin Helas wrote:
> On Don Mai 22, 2003 at 10:1621 +0100, Simon Huggins <huggie@earth.li> wrote:
> > On Thu, May 22, 2003 at 01:50:51PM -0600, xbud wrote:
> > > FYI, http://marc.theaimsgroup.com/?|=linux-kernel&m=105271679705571&w=2
> >
> > You say 2.4 in the subject and it says 2.5 in that report.
> >
> > Is 2.4 vulnerable too?
> Yes, but it's fixed in 2.4.21-rc3 already ;)
I'm not a developer and I don't really understand the
impact of this Bug.
Am I right that a local User is able to crash the system
by putting evil data into these mysterious I/O-Ports?
Is privilege escalation possible?
Is this exploitable out of a chroot-jail(ssh,postfix)?
Are there any workarounds or do I have to compile rc3?
BTW: Even if the security-team won't provide a patched kernel
(as with ptrace) I think it would be a very good idea to
at least send out a DSA to inform the users.
Thanks in advance,
Steffen
--
Nothing in life is to be feared, it is only to be understood.
Marie Curie
Reply to: