thanks the info
On 2/10/08, Greg KH <[EMAIL PROTECTED]> wrote:
> On Sun, Feb 10, 2008 at 02:02:27PM +0100, Oliver Pinter wrote:
> > thx it fixed for 2.6.22
> >
> > >>>
> >
> > commit f6e993b835393543bab2d917f9dea75218473edd
> > Author: Oliver Pinter <[EMAIL PROTECTED]>
> > Date: Sun Feb 10 1
simple len and base check is already in kernel:
2.6.22.17 @ 1176,2-16 - fs/splice.c
/*
* Sanity check this iovec. 0 read succeeds.
*/
if (unlikely(!len))
break;
error = -EFAULT;
On Feb 10, 2008 7:05 PM, Greg KH <[EMAIL PROTECTED]> wrote:
> No, this is a different CVE, as it is a different problem from the
> original 09 and 10 report.
>
> It has been given CVE-2008-0600 to address this issue (09 and 10 only
> affect .23 and .24 kernels, and have been fixed.)
>
> > +
On Sun, Feb 10, 2008 at 02:02:27PM +0100, Oliver Pinter wrote:
> thx it fixed for 2.6.22
>
> >>>
>
> commit f6e993b835393543bab2d917f9dea75218473edd
> Author: Oliver Pinter <[EMAIL PROTECTED]>
> Date: Sun Feb 10 14:03:46 2008 +0100
>
> [PATCH] vm: splice local root exploit fix for 2.6.
On Feb 10, 2008 12:22 PM, Bastian Blank <[EMAIL PROTECTED]> wrote:
> On Sun, Feb 10, 2008 at 04:40:53AM -0500, Niki Denev wrote:
> > this fixed the problem for me (kernel 2.6.24.1) :
> > It appears that the initial patch checked the input to vmsplice_to_user,
> > but the exploit used vmsplice_to_pi
thx it fixed for 2.6.22
>>>
commit f6e993b835393543bab2d917f9dea75218473edd
Author: Oliver Pinter <[EMAIL PROTECTED]>
Date: Sun Feb 10 14:03:46 2008 +0100
[PATCH] vm: splice local root exploit fix for 2.6.22.y
Based on Bastian Blank's patch
Fix for CVE_2008_0009 and CVE_2008-
On Feb 10, 2008 12:47 PM, Bastian Blank <[EMAIL PROTECTED]> wrote:
> On Sun, Feb 10, 2008 at 12:39:05PM +, Niki Denev wrote:
> > This patch is against 2.6.24.1 which has already the fix to vmsplice_to_user
> > With it i can't exploit the hole, and it is returns "invalid address"
>
> This is the
On Sun, Feb 10, 2008 at 12:39:05PM +, Niki Denev wrote:
> This patch is against 2.6.24.1 which has already the fix to vmsplice_to_user
> With it i can't exploit the hole, and it is returns "invalid address"
This is the vmsplice_to_pipe path and I have many reports that it is not
fixed.
Bastia
On Feb 10, 2008 12:22 PM, Bastian Blank <[EMAIL PROTECTED]> wrote:
> On Sun, Feb 10, 2008 at 04:40:53AM -0500, Niki Denev wrote:
> > this fixed the problem for me (kernel 2.6.24.1) :
> > It appears that the initial patch checked the input to vmsplice_to_user,
> > but the exploit used vmsplice_to_pi
On Sun, Feb 10, 2008 at 04:40:53AM -0500, Niki Denev wrote:
> this fixed the problem for me (kernel 2.6.24.1) :
> It appears that the initial patch checked the input to vmsplice_to_user,
> but the exploit used vmsplice_to_pipe which remained open to the attack.
This patch is broken. It opens the o
hmmm, with 2.6.22.y serie is too affected
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Last login: Sat Feb 9 15:34:35 2008
[EMAIL PROTECTED]:~$ ./2617_26241_root_exploit
---
Linux vmsplice Local Root Exploit
By qa
On Feb 10, 2008 1:38 AM, Niki Denev <[EMAIL PROTECTED]> wrote:
>
> On Feb 10, 2008 8:32 AM, Willy Tarreau <[EMAIL PROTECTED]> wrote:
> > On Sun, Feb 10, 2008 at 08:04:35AM +0200, Niki Denev wrote:
> > > Hi,
> > >
> > > As the subject says the 2.6.24.1 is still vulnerable to the vmsplice
> > > local
12 matches
Mail list logo