Candidate: CVE-2004-0491 References: CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126411 MLIST:[linux-kernel] 20040402 Re: disable-cap-mlock URL:http://marc.theaimsgroup.com/?l=linux-kernel&m=108087017610947&w=2 OVAL:OVAL1117 URL:http://oval.mitre.org/oval/definitions/data/oval1117.html Description: The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit. Notes: dannf> It doesn't look like the code in linux-2.4.21-mlock.patch was ever dannf> accepted upstream in 2.4 or 2.6, so it doesn't apply to us. Bugs: upstream: N/A linux-2.6: N/A 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A 2.4.19-woody-security: N/A 2.4.18-woody-security: N/A 2.4.17-woody-security: N/A 2.4.16-woody-security: N/A 2.4.17-woody-security-hppa: N/A 2.4.17-woody-security-ia64: N/A 2.4.18-woody-security-hppa: N/A