Subject: Re: [vserver] Patched base.c file for the CVE-2012-0056 root privilege escalation exploit for the 3.0.17 VServer kernel
From: Herbert Poetzl <herbert@13thfloor.at>
Date: Wed, 25 Jan 2012 18:16:45 +0100

On Tue, Jan 24, 2012 at 12:52:59AM +0100, Jean Weisbuch wrote:
> Le 24/01/2012 00:29, Sergiusz Pawlowicz a écrit :
>> Hi, does it mean a user in guest can take over the whole
>> machine or only the guest itself?

>> cheers -
>> Serge

> Only the guest itself, "fortunately".

> ---
> As promised, the kernel package for Debian : 
> http://jbboin.phpnet.org/procmemfix/linux-image-3.0.17-vs2.3.2.1-procmemfix_3.0.17-vs2.3.2.1-procmemfix-10.00.Custom_amd64.deb

> So far, i tried it on one machine and the exploit doesnt seems
> to work anymore but it might be unstable, so, try at your own
> risks.

I've uploaded two patches:
http://vserver.13thfloor.at/ExperimentalT/delta-procmem-fix01.diff
http://vserver.13thfloor.at/ExperimentalT/delta-procmem-fix02.diff

for 3.0.x and 3.1/3.2.x, so you can simply add that
one _after_ applying the Linux-VServer patch if
you like ...

HTH,
Herbert

> ps: the kernel headers package : 
> http://jbboin.phpnet.org/procmemfix/linux-headers-3.0.17-vs2.3.2.1-procmemfix_3.0.17-vs2.3.2.1-procmemfix-10.00.Custom_amd64.deb