ps: this very exploit can be blocked by setting the sysctl
kernel.perf_event_paranoid value to 2.
Le 15/05/2013 00:04, Jean Weisbuch a écrit :
> Hi,
>
> The semtex.c exploit released today permit any user on the host to
> gain root privileges, i confirm that it works on a
> 3.2.42-vs2.3.2.16-beng kernel but it doesnt work (at least not "out of
> the box") on a VServer guest with "normal" capabilities/flags used.
>
> Note that the exploit must be compiled with -O2 in order to work.
>
> More infos and the exploit code :
> http://packetstormsecurity.com/files/121616/semtex.c
>
> Regards,
> Jean Weisbuch
Received on Tue May 14 23:10:40 2013