OpenVZ Forum


Home » General » Support » Linux kernel null pointer bug
Re: Linux kernel null pointer bug [message #37196 is a reply to message #37195] Wed, 26 August 2009 07:17 Go to previous message
lazy
Messages: 16
Registered: January 2008
Junior Member
finist wrote on Wed, 26 August 2009 02:54
Quote:
but still it's possible to destabilize the kernel with a failed exploit attempt


Not exactly: you need to modify exploit to do this. But yes, it's possible, but again - from Hardware Node only.

Quote:
and there is another bug fixed in RHSA-2009:1222-02
https://rhn.redhat.com/errata/RHSA-2009-1222.html
...
testing went threw ok, i will se if there will be any problems in production


Yes, we've already seen that, thank you.



I recall when when I started one of the exploits from 32 bit guest(64 bit host), its process got blocked in kernel space and I couldn't enter any other vps, reboot machine properly etc.
when I have some time I will recheck it (maybe after all I wasn't running 64.4 on that machine) exploit was modified to run without kernel symbols in /proc


patched machines are working fine, is applying mentioned patch is sufficient ? (debian is using this patch for etch kernel so i guess it's safe to think so)


thanks for Your answer
--
Lazy

[Updated on: Wed, 26 August 2009 07:22]

Report message to a moderator

 
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Previous Topic: APF - Kernel Module Error
Next Topic: *SOLVED* What I am mistaking. Help please
Goto Forum:
  


Current Time: Mon Sep 02 06:20:28 GMT 2024

Total time taken to generate the page: 0.05326 seconds