caker wrote:
Kernel 2.4.24-linode19-1um brings us up to date with the latest Linux kernel version (2.4.24
changelog) which contains a local root exploit fix (details
here and
here), and also brings us up to date with the latest UML patch (2.4.23-1um).
disclaimer: this is a question

This is how I understand the linode setup..
host->linode kernel (this process on the host)->your linode.
so it wouldn't be safe to allow modules inserted into a linode's kernel as they would basically be executing code on the host machine..
http://isec.pl/vulnerabilities/isec-0013-mremap.txt says:
Quote:
Impact:
=======
Since no special privileges are required to use the mremap(2) system
call any process may misuse its unexpected behavior to disrupt the kernel
memory management subsystem. Proper exploitation of this vulnerability may
lead to local privilege escalation including execution of arbitrary code
with kernel level access. Proof-of-concept exploit code has been created
and successfully tested giving UID 0 shell on vulnerable systems.
If I understand this correctly, this can lead back up to the host machine since it is allows "execution of arbitrary code with
kernel level access".. right?
Kenny