I confirm that on hardy and gutsy. I also confirm that the hotfix referenced in debian bugreport http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464953 which sets the first byte of sys_vmsplice to RET in /dev/mem ( http://www.ping.uio.no/~mortehu/disable-vmsplice-if-exploitable.c ) works and prevents the exploit from functioning. I don't know if having that function returning can otherwise adversely affect the system, though.
I confirm that on hardy and gutsy. I also confirm that the hotfix referenced in debian bugreport http:// bugs.debian. org/cgi- bin/bugreport. cgi?bug= 464953 which sets the first byte of sys_vmsplice to RET in /dev/mem ( http:// www.ping. uio.no/ ~mortehu/ disable- vmsplice- if-exploitable. c ) works and prevents the exploit from functioning. I don't know if having that function returning can otherwise adversely affect the system, though.