Jump to content

vmsplice() local root exploit

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Intelmole (talk | contribs) at 20:58, 7 March 2009 (moved Vmsplice() exploit to Known Exploits of Computer Software: Move as discussed on vmsplice talk page: http://en.wikipedia.org/wiki/Talk:Vmsplice()_exploit). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.


The vmsplice() local root exploit was a vulnerability in the Linux kernel that allowed a user with shell access to mount a privilege escalation attack to gain root against a system running versions of the kernel later than 2.6.17.[1][2] This remained unpatched for several days, but was fixed in kernel version 2.6.24.2. [1]

References

  1. ^ a b Purczynskiof, Wojciech (2008-02-11). "Linux Kernel "vmsplice()" System Call Vulnerabilities". Secunia. Retrieved 2008-04-16. {{cite news}}: Check date values in: |date= (help); Unknown parameter |coauthors= ignored (|author= suggested) (help)
  2. ^ Dawson (2008-02-10). "Linux Kernel "vmsplice()" System Call Vulnerabilities". Slashdot. SourceForge. Retrieved 2008-04-16. {{cite news}}: Check date values in: |date= (help); Cite has empty unknown parameter: |coauthors= (help)