Hi, Guille -bisho- wrote: > At least the 2.4.19 is vulnerable. > A quick patch is to put a invalid binary on /proc/sys/kernel/modprobe > instead of the real modprobe binary, and then you have time to compile > out your kernel without having to run... :) That seems to work only for the exploit provided by him, but not for the isec proof-of-concept exploit. It's a better workaround to use the npt module from http://www.securiteam.com/tools/5SP082K5GK.html . This module will restrict the use of ptrace() to root. It's not a fix, but a workaround! - Alexander -- "Real men don't take backups. They put their source on a public FTP-server and let the world mirror it." -- Linus Torvalds
Attachment:
pgpf4yVrkuSLf.pgp
Description: PGP signature