[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] patch for kernel exploit?



Stephan Seitz wrote:
Zoltan HERPAI schrieb:
Hi,

As most of you probably already know, a local root exploit was released yesterday which affects kernels from 2.6.17 to 2.6.24.1. Is there an official patch for dom0 and domU kernels, or can the backport of the official kernel patch be used on these kernels?

Hi, thanks for reminding this exploit, as far as I can see, there's no
kernel patch at all available. The GIT Repository also shows no real
solution.
Do you have any suggestions on how to fix this issue _now_ ?
Hi,

For kernels around 2.6.22, backporting of the 2.6.24.1->2.6.24.2 diff will work, so this could be used for people who use 2.6.23.x and up for domU. For kernels around 2.6.18 or for which the official fix does not apply, I was told short ago that a "return -ENOSYS;" in fs/splice.c sys_vmsplice() might work as "nothing uses it", but I have yet to check it on my boxes.

Regards,
Zoltan HERPAI


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.