Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)

From: Sergiusz Pawlowicz <sergiusz_at_pawlowicz.name>
Date: Wed 15 May 2013 - 00:51:19 BST
Message-ID: <CAPRDrAHSsYuP5vO6tZwivFS6BQ2rENnoZtqpnQ4AAx0-iBwD6Q@mail.gmail.com>

On Wed, May 15, 2013 at 12:30 AM, Ben Green <ben@bristolwireless.net> wrote:
> Quoting Sergiusz Pawlowicz <sergiusz@pawlowicz.name>:
>
>> on 3.2.42-vs2.3.2.16-beng if you run semtex.c in a guest with VIRT_MEM
>> - server is being restarted at once, but no root.
>>
>> s.
>
>
> Should I be re-compiling with 3.2.44 right now, or should I wait for a
> patch/mainline fix?
>
> This I'll start compiling anyway!

do we need PERF_EVENTS in the kernel at all? i would recon to remove it.

s.
Received on Wed May 15 00:59:13 2013

[Next/Previous Months] [Main vserver Project Homepage] [Howto Subscribe/Unsubscribe] [Paul Sladen's vserver stuff]
Generated on Wed 15 May 2013 - 00:59:13 BST by hypermail 2.1.8