The affected system call first appeared in version 2.6.17 of the Linux kernel, but wasn't left open to exploit until changes were made with the 2.6.23 version.
As we have 2.6.22 we're probably safe
Husse wrote:I think you can skip probably
Husse wrote:As we have 2.6.22 we're probably safe
A security issue affects the following Ubuntu releases:
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Wojciech Purczynski discovered that the vmsplice system call did
not properly perform verification of user-memory pointers. A local
attacker could exploit this to overwrite arbitrary kernel memory
and gain root privileges. (CVE-2008-0600)
When the word of this problem first came out, it was thought to only affect 2.6.23 and 2.6.24 kernels (...) In fact, the vulnerability was the result of a different problem - and it is a much worse one, in that kernels all the way back to 2.6.17 are affected. At this point, a large proportion of running Linux systems are vulnerable.
clem wrote:Yes, these particular versions of the kernel were moved to Level 3 (see above in the thread).
Husse wrote:It's only some headers
And it's only if you have more than one user that something bad could happen
But on the other hand we all have at least two users - root and the "Superuser"
Users browsing this forum: Mute Ant and 35 guests