Linux Kernel Shared Memory Security Restriction Bypass Vulnerabilities

The Linux kernel is prone to vulnerabilities regarding access to shared memory.

A local attacker could potentially gain read and write access to shared memory and write access to read-only tmpfs filesystems, bypassing security restrictions.

An attacker can exploit these issues to possibly corrupt applications and their data when the applications use temporary files or shared memory.


 

Privacy Statement
Copyright 2010, SecurityFocus