lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <s1wfwx9lu9a.fsf@cornavin.uio.no> Date: Thu, 16 Sep 2010 14:58:57 +0200 From: Terje Malmedal <terje.malmedal@...t.uio.no> To: full-disclosure@...ts.grok.org.uk Subject: Workaround for Ac1db1tch3z exploit. If you do not actually need to run any 32bits binaries on x86_64 you can do: echo ':32bits:M:0:\x7fELF\x01::/bin/echo:' > /proc/sys/fs/binfmt_misc/register This will make the kernel run /bin/echo filename instead of executing the file whenever it sees a 32bit ELF binary. Of course if you actually *need* to run some 32bits binaries this will not help you. -- - Terje malmedal@...t.uio.no _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/