Robert G. (Doc) Savage wrote:
On Tue, 2010-09-21 at 09:19 -0500, Robert G. (Doc) Savage wrote:
On Tue, 2010-09-21 at 08:18 -0400, Linda Wang wrote:
It is live on RHN as of late last night/early this morning:
RHSA-2010:0704.
Confirmed. I had to run 'yum update' twice for the kernel update to
appear, but it's there. Come 'n get it

Well... Maybe. I downloaded and installed the new kernel, then rebooted
and reran the Ksplice diagnostic:

$ ./diagnose-2010-3081 Diagnostic tool for public CVE-2010-3081 exploit -- Ksplice,
        Inc.
        (see http://www.ksplice.com/uptrack/cve-2010-3081)
$$$ Kernel release: 2.6.18-194.11.4.el5
        $$$ Backdoor in LSM (1/3): checking...not present.
        $$$ Backdoor in timer_list_fops (2/3): not available.
        $$$ Backdoor in IDT (3/3): checking...not present.
Your system is free from the backdoors that would be left in
        memory
        by the published exploit for CVE-2010-3081.
This doesn't look right. That's the same result I got for the -194.11.3
kernel. I was expecting to see something similar to the output I got for
the F13 kernel:

        $$$ Kernel release: 2.6.34.6-54.fc13.x86_64
        !!! Could not find symbol: per_cpu__current_task
A symbol required by the published exploit for CVE-2010-3081 is
        not provided by your kernel.  The exploit would not work on your
        system.
Thoughts?

--Doc Savage, CISSP
  Fairview Heights, IL



I ran the diagnostic code and got the same result. I then tried the exploit code and it errored out instead of giving me a shell.

Hugh

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to