Note that there may be a little confusion as there are actually three vmsplice issues:
CVE-2008-0009 is already fixed upstream, does not affect any RHEL, has no public exploit. Upstream patch is the second hunk of: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8811930dc74a503415b35c4a79d14fb0b408a361
CVE-2008-0010 is already fixed upstream, does not affect any RHEL, but has a public exploit. ( http://www.milw0rm.com/exploits/5093 ) Upstream patch is the first hunk of: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8811930dc74a503415b35c4a79d14fb0b408a361
CVE-2008-0600 is not yet fixed upstream, affects RHEL5, and has a public exploit ( http://www.milw0rm.com/exploits/5092 )
Note that there may be a little confusion as there are actually three vmsplice
issues:
CVE-2008-0009 is already fixed upstream, does not affect any RHEL, has no git.kernel. org/?p= linux/kernel/ git/torvalds/ linux-2. 6.git;a= commit; h=8811930dc74a5 03415b35c4a79d1 4fb0b408a361
public exploit. Upstream patch is the second hunk of:
http://
CVE-2008-0010 is already fixed upstream, does not affect any RHEL, but has www.milw0rm. com/exploits/ 5093 ) git.kernel. org/?p= linux/kernel/ git/torvalds/ linux-2. 6.git;a= commit; h=8811930dc74a5 03415b35c4a79d1 4fb0b408a361
a public exploit. ( http://
Upstream patch is the first hunk of:
http://
CVE-2008-0600 is not yet fixed upstream, affects RHEL5, www.milw0rm. com/exploits/ 5092 )
and has a public exploit ( http://