Maybe check LKML for any traffic on that issue, or some IRC channels
such as #dosemu if there is one. What Pat wrote in Slackware's ChangeLog:
Tue Aug 18 18:50:46 CDT 2009
Patched kernels and kernel packages for Linux 188.8.131.52 to address
a bug in proto_ops structures which could allow a user to use the
kernel sendpage operation to execute arbitrary code in page zero.
This could allow local users to gain escalated privileges.
This flaw was discovered by Tavis Ormandy and Julien Tinnes of the
Google Security Team.
For more information, see:
In addition, these kernels change the CONFIG_SECURITY_DEFAULT_MMAP_MIN_ADDR
kernel config option value to 4096, which should prevent the execution
of arbitrary code by future NULL dereference bugs that might be found
in the kernel. If you are compiling your own kernel, please check this
option in your .config. If it is set to =0, you may wish to edit it
to 4096 (or some other value > 0) and then reconfigure, or the kernel
will not have default protection against zero page attacks from
is what they did in vanilla Kernel.org source, also:
mingdao@jeremiah:~/kernel/linux-184.108.40.206$ grep 'DEFAULT_MMAP_MIN_ADDR' .config
Seems to be some anticipation for further null dereference bugs, from
what I've been reading on LKML.