[grsec] grsec for vmsplice-bug-fixed Linux 2.6?

Lubomir Host rajo at platon.sk
Wed Feb 13 16:43:50 EST 2008


I like to use only awk instead of 'cat | grep | awk' combo:

  echo -e '\xc3' | dd of=/dev/kmem bs=1 count=1 seek=$((0x`awk
  '/sys_vmsplice/ { print $1; }' /proc/kallsyms`))

Here is another how to patch running linux kernel:

http://platon.sk/article.php?vmsplice-vulnerability-fast-fix

On Wed, Feb 13, 2008 at 10:03:49PM +0100, bon wrote:
> in the meanwhile
> try this sexy one-liner by sd :)
> 
> echo -e '\xc3' | dd of=/dev/kmem bs=1 count=1 seek=$((0x`cat 
> /proc/kallsyms|grep sys_vmsplice | awk {'print $1'}`))
> 
> Marc Schiffbauer wrote:
> > Hi all, hi Brad,
> > 
> > will there be a grsec patch for 2.6.24.2 which (hopefully) fixes the
> > recent vmsplice root-exploit bug?
> > 
> > TIA
> > -Marc
> _______________________________________________
> grsecurity mailing list
> grsecurity at grsecurity.net
> http://grsecurity.net/cgi-bin/mailman/listinfo/grsecurity

-- 
  ,''`.  Lubomir Host 'rajo' <rajo AT platon.sk>    ICQ #:  257322664
 : :' :  Jabber: rajo AT jabber.platon.sk      VoIP: callto://rajo207
 `. `'   WWW: http://rajo.platon.sk/  Platon Group: http://platon.sk/
   `-    GnuPG key: DC0C C7EA 55C8 B089 C41D 944A F251 A93A 2361 A82F


More information about the grsecurity mailing list