Vmsplice() local root exploit: Difference between revisions

Content deleted Content added
PigFlu Oink (talk | contribs)
m fmt headline levels to start with "==", WikiCheck check #19 fmt standard section headings to "=="
can you please be a tad more patient and cause fewer edit conflicts? :) completed the merge nicely
 
(15 intermediate revisions by 6 users not shown)
Line 1:
#REDIRECT [[Linux kernel#Security]] {{R from merge}}
The following is a list of known exploits of computer software
{{expand list}}
 
[[Category:ComputerPrivilege securityescalation exploits]]
==Operating Systems==
 
===Linux===
 
====vmsplice() exploit====
{| border="1"
|+ vmsplice() exploit
| Program Affected || Linux
|-
| Initial version affected || 2.6.17
|-
| Exploit fixed in version || 2.6.24.2
|}
 
The '''vmsplice() local root exploit''' was a vulnerability in the [[Linux kernel]] that allowed a user with [[shell account|shell access]] to mount a [[privilege escalation]] attack to gain [[root]] against a system running versions of the kernel later than 2.6.17.<ref name="Secunia">{{cite news | first=Wojciech | last=Purczynskiof | coauthors= qaaz | title= Linux Kernel "vmsplice()" System Call Vulnerabilities | date=[[2008-02-11]] | url =http://secunia.com/advisories/28835/ | work =[[Secunia]] | pages = | accessdate = 2008-04-16 | language = }}</ref><ref>{{cite news | first= | last=Dawson | coauthors= | title= Linux Kernel "vmsplice()" System Call Vulnerabilities | date=[[2008-02-10]] | publisher=[[SourceForge]] | url =http://it.slashdot.org/article.pl?sid=08/02/10/2011257 | work =[[Slashdot]] | pages = | accessdate = 2008-04-16 | language = }}</ref> This remained unpatched for several days, but was fixed in kernel version 2.6.24.2. <ref name="Secunia"/>
 
==References==
{{Reflist}}
 
[[Category:Computer security exploits]]
[[Category:Computer lists]]