Required CVE Record Information
Description
The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit.
References 8 Total
- oval.cisecurity.org: oval:org.mitre.oval:def:10672 vdb-entrysignature
- oval.cisecurity.org: oval:org.mitre.oval:def:1117 vdb-entrysignature
- secunia.com: 19607 third-party-advisory
- redhat.com: RHSA-2005:472 vendor-advisory
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126411
- marc.info: [linux-kernel] 20040402 Re: disable-cap-mlock mailing-list
- patches.sgi.com: 20060402-01-U vendor-advisory
- securityfocus.com: 13769 vdb-entry
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 8 Total
- oval.cisecurity.org: oval:org.mitre.oval:def:10672 vdb-entrysignaturex_transferred
- oval.cisecurity.org: oval:org.mitre.oval:def:1117 vdb-entrysignaturex_transferred
- secunia.com: 19607 third-party-advisoryx_transferred
- redhat.com: RHSA-2005:472 vendor-advisoryx_transferred
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126411 x_transferred
- marc.info: [linux-kernel] 20040402 Re: disable-cap-mlock mailing-listx_transferred
- patches.sgi.com: 20060402-01-U vendor-advisoryx_transferred
- securityfocus.com: 13769 vdb-entryx_transferred