TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Linux kernel: multiple x86_64 vulnerabilities

256 点作者 jgeralnik超过 10 年前

4 条评论

dmix超过 10 年前
&gt; This is likely to be easy to exploit for privilege escalation, except on systems with SMAP or UDEREF<p>Another reminder why everyone should be using <a href="https://grsecurity.net" rel="nofollow">https:&#x2F;&#x2F;grsecurity.net</a> which provides these mitigations to the Linux kernel via patches. GRSecurity has had SMAP aka KERNEXEC for a long time as well as UDEREF <a href="https://grsecurity.net/~spender/uderef.txt" rel="nofollow">https:&#x2F;&#x2F;grsecurity.net&#x2F;~spender&#x2F;uderef.txt</a><p>If you keep any sensitive data on a Linux server you should seriously consider grsec.<p>Even last week there was an ASLR bypass posted on OSS-security which of-course grsec already protected you against <a href="http://seclists.org/oss-sec/2014/q4/908" rel="nofollow">http:&#x2F;&#x2F;seclists.org&#x2F;oss-sec&#x2F;2014&#x2F;q4&#x2F;908</a><p>There is a lot of drama around the fact Linux core devs don&#x27;t adopt these patches by default. But regardless Linux is pretty insecure by default and grsec makes privesc via various classes of exploits significantly harder.
评论 #8764418 未加载
评论 #8764743 未加载
评论 #8766463 未加载
评论 #8764439 未加载
评论 #8764532 未加载
评论 #8767855 未加载
0x0超过 10 年前
Status for at least one of the CVEs in Debian is here: <a href="https://security-tracker.debian.org/tracker/CVE-2014-8133" rel="nofollow">https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2014-8133</a> (currently unfixed)
vojfox超过 10 年前
How can this&#x2F;these be exploited?
评论 #8766931 未加载
xorcist超过 10 年前
Is there any information whether the fix is in 3.18.1, which was released yesterday?
评论 #8774674 未加载