Linux 2.0.37 does not properly encode the Custom segment limit, which allows local users to gain root privileges by accessing and modifying kernel memory.
/*
source: wwwsecurityfocuscom/bid/523/info
This vulnerability has to do with the division of the address space between a user process and the kernel Because of a bug, if you select a non-standard memory configuration, sometimes user level processes may be given access upto 252Mb of memory that are really part of the kernel This allows ...