On Feb 10, 2008 12:22 PM, Bastian Blank <[EMAIL PROTECTED]> wrote:
> On Sun, Feb 10, 2008 at 04:40:53AM -0500, Niki Denev wrote:
> > this fixed the problem for me (kernel 2.6.24.1) :
> > It appears that the initial patch checked the input to vmsplice_to_user,
>
On Feb 10, 2008 12:47 PM, Bastian Blank <[EMAIL PROTECTED]> wrote:
> On Sun, Feb 10, 2008 at 12:39:05PM +0000, Niki Denev wrote:
> > This patch is against 2.6.24.1 which has already the fix to vmsplice_to_user
> > With it i can't exploit the hole, and it is returns &qu
On Feb 10, 2008 12:22 PM, Bastian Blank <[EMAIL PROTECTED]> wrote:
> On Sun, Feb 10, 2008 at 04:40:53AM -0500, Niki Denev wrote:
> > this fixed the problem for me (kernel 2.6.24.1) :
> > It appears that the initial patch checked the input to vmsplice_to_user,
>
On Feb 10, 2008 1:38 AM, Niki Denev <[EMAIL PROTECTED]> wrote:
>
> On Feb 10, 2008 8:32 AM, Willy Tarreau <[EMAIL PROTECTED]> wrote:
> > On Sun, Feb 10, 2008 at 08:04:35AM +0200, Niki Denev wrote:
> > > Hi,
> > >
> > > As the subject sa
On Feb 10, 2008 8:32 AM, Willy Tarreau <[EMAIL PROTECTED]> wrote:
> On Sun, Feb 10, 2008 at 08:04:35AM +0200, Niki Denev wrote:
> > Hi,
> >
> > As the subject says the 2.6.24.1 is still vulnerable to the vmsplice
> > local root exploit.
>
> Yes indeed
Hi,
As the subject says the 2.6.24.1 is still vulnerable to the vmsplice
local root exploit.
[EMAIL PROTECTED] tmp]$ uname -a
Linux tester 2.6.24.1 #1 Sun Feb 10 00:06:49 EST 2008 i686 unknown
[EMAIL PROTECTED] tmp]$ ./vms
---
Linux vmsplice Local Root Exploit
B
6 matches
Mail list logo