[grsec] grsec for vmsplice-bug-fixed Linux 2.6?
Lubomir Host
rajo at platon.sk
Wed Feb 13 16:43:50 EST 2008
I like to use only awk instead of 'cat | grep | awk' combo:
echo -e '\xc3' | dd of=/dev/kmem bs=1 count=1 seek=$((0x`awk
'/sys_vmsplice/ { print $1; }' /proc/kallsyms`))
Here is another how to patch running linux kernel:
http://platon.sk/article.php?vmsplice-vulnerability-fast-fix
On Wed, Feb 13, 2008 at 10:03:49PM +0100, bon wrote:
> in the meanwhile
> try this sexy one-liner by sd :)
>
> echo -e '\xc3' | dd of=/dev/kmem bs=1 count=1 seek=$((0x`cat
> /proc/kallsyms|grep sys_vmsplice | awk {'print $1'}`))
>
> Marc Schiffbauer wrote:
> > Hi all, hi Brad,
> >
> > will there be a grsec patch for 2.6.24.2 which (hopefully) fixes the
> > recent vmsplice root-exploit bug?
> >
> > TIA
> > -Marc
> _______________________________________________
> grsecurity mailing list
> grsecurity at grsecurity.net
> http://grsecurity.net/cgi-bin/mailman/listinfo/grsecurity
--
,''`. Lubomir Host 'rajo' <rajo AT platon.sk> ICQ #: 257322664
: :' : Jabber: rajo AT jabber.platon.sk VoIP: callto://rajo207
`. `' WWW: http://rajo.platon.sk/ Platon Group: http://platon.sk/
`- GnuPG key: DC0C C7EA 55C8 B089 C41D 944A F251 A93A 2361 A82F
More information about the grsecurity
mailing list