Jump to content

vmsplice() local root exploit

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Full-date unlinking bot (talk | contribs) at 06:49, 8 December 2009 (Unlinking full-dates. Details here. Codes: ISO1(×2)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.


The vmsplice() local root exploit was a short-lived vulnerability in the Linux kernel that allowed a user with shell access to mount a privilege escalation attack to gain root privileges against a system running versions of 2.6.17 or later of the kernel.[1][2] This was fixed in kernel version 2.6.24.2. [1]

References

  1. ^ a b Purczynskiof, Wojciech (2008-02-11). "Linux Kernel "vmsplice()" System Call Vulnerabilities". Secunia. Retrieved 2008-04-16. {{cite news}}: Unknown parameter |coauthors= ignored (|author= suggested) (help)
  2. ^ Dawson (2008-02-10). "Linux Kernel "vmsplice()" System Call Vulnerabilities". Slashdot. SourceForge. Retrieved 2008-04-16. {{cite news}}: Cite has empty unknown parameter: |coauthors= (help)