I confirm that on hardy and gutsy. I also confirm that the hotfix
referenced in debian bugreport http://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=464953 which sets the first byte of sys_vmsplice
to RET in /dev/mem ( http://www.ping.uio.no/~mortehu/disable-vmsplice-
if-exploitable.c ) works and prevents the exploit from functioning. I
don't know if having that function returning can otherwise adversely
affect the system, though.

-- 
Local root exploit in kernel 2.6.17 - 2.6.24
https://bugs.launchpad.net/bugs/190587
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to