Hi, This doesn't work, because it still creates a DoS condition when it alters your memory map.
On Mon, 2008-02-11 at 07:08 +0000, slasher-fun wrote: > Temporary fix : > > * Download http://www.ping.uio.no/~mortehu/disable-vmsplice-if-exploitable.c > * Compile it using gcc (so "gcc disable-vmsplice-if-exploitable.c -o > rm_exploit") as normal user > * Run it as normal user > --> You are now protected until the next reboot of the system > -- Local root exploit in kernel 2.6.17 - 2.6.24 (vmsplice) https://bugs.launchpad.net/bugs/190587 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs