blob: 245dac3b27a5edd9343192192de3fae2f4acac63 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
|
Candidate: CVE-2004-0491
References:
CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126411
MLIST:[linux-kernel] 20040402 Re: disable-cap-mlock
URL:http://marc.theaimsgroup.com/?l=linux-kernel&m=108087017610947&w=2
OVAL:OVAL1117
URL:http://oval.mitre.org/oval/definitions/data/oval1117.html
Description:
The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly
maintain the mlock page count when one process unlocks pages that belong to
another process, which allows local users to mlock more memory than specified
by the rlimit.
Notes:
dannf> It doesn't look like the code in linux-2.4.21-mlock.patch was ever
dannf> accepted upstream in 2.4 or 2.6, so it doesn't apply to us.
Bugs:
upstream: N/A
linux-2.6: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.4.19-woody-security: N/A
2.4.18-woody-security: N/A
2.4.17-woody-security: N/A
2.4.16-woody-security: N/A
2.4.17-woody-security-hppa: N/A
2.4.17-woody-security-ia64: N/A
2.4.18-woody-security-hppa: N/A
|