Re: [vserver] Patched base.c file for the CVE-2012-0056 root privilege escalation exploit for the 3.0.17 VServer kernel

From: Jean Weisbuch <jean_at_phpnet.org>
Date: Mon 23 Jan 2012 - 23:52:59 GMT
Message-ID: <4F1DF2DB.2050704@phpnet.org>

Le 24/01/2012 00:29, Sergiusz Pawlowicz a écrit :
> Hi, does it mean a user in guest can take over the whole machine or
> only the guest itself?
>
> cheers -
> Serge
Only the guest itself, "fortunately".

---
As promised, the kernel package for Debian : 
http://jbboin.phpnet.org/procmemfix/linux-image-3.0.17-vs2.3.2.1-procmemfix_3.0.17-vs2.3.2.1-procmemfix-10.00.Custom_amd64.deb
So far, i tried it on one machine and the exploit doesnt seems to work 
anymore but it might be unstable, so, try at your own risks.
ps: the kernel headers package : 
http://jbboin.phpnet.org/procmemfix/linux-headers-3.0.17-vs2.3.2.1-procmemfix_3.0.17-vs2.3.2.1-procmemfix-10.00.Custom_amd64.deb
Received on Mon Jan 23 23:53:12 2012
[Next/Previous Months] [Main vserver Project Homepage] [Howto Subscribe/Unsubscribe] [Paul Sladen's vserver stuff]
Generated on Mon 23 Jan 2012 - 23:53:12 GMT by hypermail 2.1.8