*** This bug has been split off bug 148868 *** ------- Original comment by Mark J. Cox (Security Response Team) on 2005.02.16 09:34 ------- Mike O'Connor reported a local DoS on ia64 to vendor-sec on Jan 21 with a demo exploit. This issue is embargoed with no date currently set. The fix has been applied to 2.6: http://linux.bkbits.net:8080/linux-2.6/cset@41f2beablXVnAs_6fznhhITh1j5hZg
Created attachment 111330 [details] proposed patch from Debian
A fix for this problem has just been committed to the RHEL3 U5 patch pool this evening (in kernel version 2.4.21-31.EL).
removing embargo
A fix for this problem has also been committed to the RHEL3 E5 patch pool this evening (in kernel version 2.4.21-27.0.3.EL).
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-293.html
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-294.html