On Tue, Sep 01, 2009 at 11:56:55PM +0200, Josip Rodin wrote:
AFAICT the linux-2.6.27-openvz has this obvious issue with mmap_min_addr due
to security/Kconfig containing:
config SECURITY
bool Enable different security models
depends on SYSFS !VE
config
Hi Scott,
How about the latest RHEL4-based OpenVZ kernel? Is it vulnerable?
No, it is not vulnerable simply because all vulnerable protocols are absent in
the kernel (switched off in our configs).
Are there any other advantages to the current RHEL5 kernel vs. the current
RHEL4 kernel?
On Tue, Aug 18, 2009 at 04:31:12PM +0400, Konstantin Khorenko wrote:
Hi all,
just wanted to share the info:
i checked this issue and found that 2.6.18-128.2.1.el5.028stab064.4 kernel
(latest OVZ) is immune to the exploits on the issue described at
Hi all,
just wanted to share the info:
i checked this issue and found that 2.6.18-128.2.1.el5.028stab064.4 kernel
(latest OVZ) is immune to the exploits on the issue described at
http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html
Exploits do not work both inside a Container
Hi Konstantin,
Michael, could you please confirm that you were able to gain root on a
kernel before 64.4?
Confirmed. I didn't test 028stab064.4 (which was released just a few days
prior to the anouncement of the exploit), but tested older kernels. With the
following kernels I could get root
Konstantin (or Kir),
- Konstantin Khorenko khore...@openvz.org wrote:
just wanted to share the info:
i checked this issue and found that 2.6.18-128.2.1.el5.028stab064.4
kernel (latest OVZ) is immune to the exploits on the issue described
at
OpenVZ Kernel jockies...
Anyone like to comment on if they think this could be exploited from a
guest VM to execute code on the host node? This seems pretty serious
and exploits are in the wild.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692
Hi Michael,
OpenVZ Kernel jockies...
Anyone like to comment on if they think this could be exploited from a
guest VM to execute code on the host node?
CVE-2009-2692
I tested it on Friday with the exploit from Brad Spengler, which is mentioned
on this page: