|
BugTraq
Linux kernel scm_send local DoS Dec 14 2004 10:32AM Paul Starzetz (ihaquer isec pl) (2 replies) Re: Linux kernel scm_send local DoS Dec 23 2004 03:54PM Pavel Kankovsky (peak argo troja mff cuni cz) Re: Linux kernel scm_send local DoS Dec 15 2004 03:23AM even multiplexed (Shadow333 gmx at) (1 replies) Re: Linux kernel scm_send local DoS Dec 15 2004 12:31PM Paul Starzetz (ihaquer isec pl) (3 replies) Re: [Full-Disclosure] Re: Linux kernel scm_send local DoS Dec 23 2004 03:59AM Valdis Kletnieks vt edu |
|
Privacy Statement |
> I don't think this is practicable, since the bugs reside in deep kernel
> functions. You can not fix it just by disabling a particular syscall. You
> have patch a running kernel binary, maybe someone comes up with this kind
> of utlility.
Not by disabling the syscall but by replacing it in the manner that a
rootkit replaces syscalls. Build a new kernel from the same
source/config except for patch. Replace syscalls where there is change.
Practical?
Stable?
No. Much easier to simply reboot to new kernel. If service(s) are so
critical as to not tolerate a reboot yet have a single point of failure
on this one component then there are greater problems at play.
--
Chief Gadgeteer
Elegant Innovations
[ reply ]