Not logged in
Log in now
Create an account
Subscribe to LWN
LWN.net Weekly Edition for December 5, 2013
Deadline scheduling: coming soon?
LWN.net Weekly Edition for November 27, 2013
ACPI for ARM?
LWN.net Weekly Edition for November 21, 2013
I took the fedora update kernel-22.214.171.124-137.fc8 straight from the build system
(koji.fedoraproject.org) about 21 hours ago.
I couldn't wait for it to be distributed to the mirrors, I have lots of students with shell
accounts that read slashdot!
distro update progress
Posted Feb 12, 2008 8:17 UTC (Tue) by nix (subscriber, #2304)
It is too late. Now you have lots of new co-system-administrators. ;)
Posted Feb 12, 2008 11:49 UTC (Tue) by Velmont (guest, #46433)
You could always had used the quick hotfix to disable vmsplice (no reboot necessary):
Posted Feb 12, 2008 18:58 UTC (Tue) by incase (subscriber, #37115)
That "fix" is even worse than the problem itself:
It first tries wether the exploit works and overwrites parts of kernel memory on the way.
If your machine only has few and trusted users, don't use it. If you have untrusted users (or
anticipate having some remote exploit allowing the attacker to execute his code under some
(non-root) account, it would be better to shut down the machine until you have an updated
kernel installed. Either by patching your kernel yourself or by installing a distribution
kernel with the fixes in it.
Posted Feb 13, 2008 10:52 UTC (Wed) by Velmont (guest, #46433)
If you use the new hotfix, it will *not* use the exploit to get root but just disable
Morten Hustveit made the patch while waiting for a pizza delivery, and didn't look at the
exploit - now the second version enables sysadmins to disable vmsplice more securely. ;-)
Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds