summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2004-0491
blob: 245dac3b27a5edd9343192192de3fae2f4acac63 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Candidate: CVE-2004-0491
References: 
 CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126411
 MLIST:[linux-kernel] 20040402 Re: disable-cap-mlock
 URL:http://marc.theaimsgroup.com/?l=linux-kernel&m=108087017610947&w=2
 OVAL:OVAL1117
 URL:http://oval.mitre.org/oval/definitions/data/oval1117.html
Description: 
 The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly
 maintain the mlock page count when one process unlocks pages that belong to
 another process, which allows local users to mlock more memory than specified
 by the rlimit.
Notes: 
 dannf> It doesn't look like the code in linux-2.4.21-mlock.patch was ever
 dannf> accepted upstream in 2.4 or 2.6, so it doesn't apply to us.
Bugs: 
upstream: N/A
linux-2.6: N/A
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.4.19-woody-security: N/A
2.4.18-woody-security: N/A
2.4.17-woody-security: N/A
2.4.16-woody-security: N/A
2.4.17-woody-security-hppa: N/A
2.4.17-woody-security-ia64: N/A
2.4.18-woody-security-hppa: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy