Re: [vserver] Patched base.c file for the CVE-2012-0056 root privilege escalation exploit for the 3.0.17 VServer kernel

From: Herbert Poetzl <herbert_at_13thfloor.at>
Date: Wed 25 Jan 2012 - 17:16:45 GMT
Message-ID: <20120125171645.GF29272@MAIL.13thfloor.at>

On Tue, Jan 24, 2012 at 12:52:59AM +0100, Jean Weisbuch wrote:
> Le 24/01/2012 00:29, Sergiusz Pawlowicz a écrit :
>> Hi, does it mean a user in guest can take over the whole
>> machine or only the guest itself?

>> cheers -
>> Serge

> Only the guest itself, "fortunately".

> ---
> As promised, the kernel package for Debian :
> http://jbboin.phpnet.org/procmemfix/linux-image-3.0.17-vs2.3.2.1-procmemfix_3.0.17-vs2.3.2.1-procmemfix-10.00.Custom_amd64.deb

> So far, i tried it on one machine and the exploit doesnt seems
> to work anymore but it might be unstable, so, try at your own
> risks.

I've uploaded two patches:
http://vserver.13thfloor.at/ExperimentalT/delta-procmem-fix01.diff
http://vserver.13thfloor.at/ExperimentalT/delta-procmem-fix02.diff

for 3.0.x and 3.1/3.2.x, so you can simply add that
one _after_ applying the Linux-VServer patch if
you like ...

HTH,
Herbert

> ps: the kernel headers package :
> http://jbboin.phpnet.org/procmemfix/linux-headers-3.0.17-vs2.3.2.1-procmemfix_3.0.17-vs2.3.2.1-procmemfix-10.00.Custom_amd64.deb
Received on Wed Jan 25 17:20:06 2012

[Next/Previous Months] [Main vserver Project Homepage] [Howto Subscribe/Unsubscribe] [Paul Sladen's vserver stuff]
Generated on Wed 25 Jan 2012 - 17:20:06 GMT by hypermail 2.1.8