Re: [vserver] Zero day privilege escalation exploit for kernels 2.6.37=>3.8.10 (CVE-2013-2094)

From: Ben Green <ben_at_bristolwireless.net>
Date: Thu 16 May 2013 - 23:12:23 BST
Message-ID: <20130516231223.Horde.wOsd6ftCd8XXpF2buuZvjQ4@slackmail.co.uk>

Quoting Eugen Leitl <eugen@leitl.org>:

> By the way, thanks for all the work. In case you have a
> tip jar, I'm sure your grateful users would contribute.

Interesting thought Eugen, I'll think about that.

In other news, it was not possible to disable CONFIG_PERF_EVENT in the
3.2.44 kernel. There's a build in the Psand repos now that represents
my attempt to do that. You really can't disable it, CONFIG_X86=y turns
it on again, which obviously is something I can't turn off.

I'm rebuilding now with the relevant patch in place, a simple 1 liner.
I'll upload to the Psand repos in the morning.

Cheers,
Ben
Received on Thu May 16 23:13:45 2013

[Next/Previous Months] [Main vserver Project Homepage] [Howto Subscribe/Unsubscribe] [Paul Sladen's vserver stuff]
Generated on Thu 16 May 2013 - 23:13:45 BST by hypermail 2.1.8