BugTraq
Linux kernel scm_send local DoS Dec 14 2004 10:32AM
Paul Starzetz (ihaquer isec pl) (2 replies)
Re: Linux kernel scm_send local DoS Dec 23 2004 03:54PM
Pavel Kankovsky (peak argo troja mff cuni cz)
Re: Linux kernel scm_send local DoS Dec 15 2004 03:23AM
even multiplexed (Shadow333 gmx at) (1 replies)
Re: Linux kernel scm_send local DoS Dec 15 2004 12:31PM
Paul Starzetz (ihaquer isec pl) (3 replies)
Re: [Full-Disclosure] Re: Linux kernel scm_send local DoS Dec 23 2004 03:59AM
Valdis Kletnieks vt edu
Re: Linux kernel scm_send local DoS Dec 15 2004 08:48PM
gadgeteer elegantinnovations org
On Wed, Dec 15, 2004 at 01:31:30PM +0100, Paul Starzetz (ihaquer (at) isec (dot) pl [email concealed]) wrote:
> I don't think this is practicable, since the bugs reside in deep kernel
> functions. You can not fix it just by disabling a particular syscall. You
> have patch a running kernel binary, maybe someone comes up with this kind
> of utlility.

Not by disabling the syscall but by replacing it in the manner that a
rootkit replaces syscalls. Build a new kernel from the same
source/config except for patch. Replace syscalls where there is change.
Practical?
Stable?
No. Much easier to simply reboot to new kernel. If service(s) are so
critical as to not tolerate a reboot yet have a single point of failure
on this one component then there are greater problems at play.
--
Chief Gadgeteer
Elegant Innovations

[ reply ]
Re: Linux kernel scm_send local DoS Dec 15 2004 12:52PM
even multiplexed (Shadow333 gmx at)


 

Privacy Statement
Copyright 2010, SecurityFocus