Linux Kernel Vulnerability ... 2.6.24.1 and prior
From the “batten the hatches department” (borrowed from slashdot), it seems like we have been doing a lot of battening lately and will do even more in the next…um, week or so? Here is one for the Linux people on pre-patch Tuesday, oh my…
Gordon sent us this quote from Slashdot: "This local root exploit (Debian, Ubuntu) seems to work everywhere I try it, as long as it's a Linux kernel version 2.6.17 to 2.6.24.1. If you don't trust your users (which you shouldn't), better compile a new kernel without vmsplice."
http://www.securityfocus.com/bid/27704/discuss
http://www.securityfocus.com/bid/27704/solution
Update 2: RB wrote in and said, "Kernels using the grsecurity patches (eg. Gentoo hardened-sources) that are appropriately configured are not vulnerable to this. According to the author, PAX_MEMORY_UDEREF is the critical component, among others. I've verified this on several 2.6.23.14 32 and 64-bit systems."
Comments