Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and device for repairing kernel vulnerabilities

A kernel and vulnerability technology, applied in the field of computer and information security, can solve problems such as costing large resources, and achieve the effect of overcoming fragmentation

Active Publication Date: 2018-07-27
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When there are many kernel versions to be patched, it takes a lot of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for repairing kernel vulnerabilities
  • Method and device for repairing kernel vulnerabilities
  • Method and device for repairing kernel vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The application will be further described in detail below with reference to the drawings and embodiments. It can be understood that the specific embodiments described here are only used to explain the related invention, but not to limit the invention. In addition, it should be noted that, for ease of description, only the parts related to the relevant invention are shown in the drawings.

[0026] It should be noted that the embodiments in this application and the features in the embodiments can be combined with each other if there is no conflict. Hereinafter, the present application will be described in detail with reference to the drawings and in conjunction with embodiments.

[0027] figure 1 An exemplary system architecture 100 to which an embodiment of the method for repairing kernel vulnerabilities or the device for repairing kernel vulnerabilities of the present application can be applied is shown.

[0028] Such as figure 1 As shown, the system architecture 100 may inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method and a device for repairing kernel vulnerabilities. A specific implementation of the method includes: collecting attribute information of the kernel to be repaired, and the attribute information includes characteristic information used to characterize the code loading mode supported by the kernel to be repaired; obtaining the vulnerability repair code matching the characteristic information, wherein the vulnerability repair code Used to call the patch application programming interface, the patch application programming interface is used to adapt the vulnerability repair code to the kernel function of different kernels; load the vulnerability repair code and relocate the instructions contained in the vulnerability repair code; The address after the relocation of the patch application programming interface is replaced with the address of the kernel function called by the vulnerability repair code; the vulnerability repair code after the address replacement is executed to repair the kernel vulnerability. This implementation manner expands the use range of the vulnerability repair code, so that it can be applied to various types of kernels.

Description

Technical field [0001] This application relates to the field of computer technology, in particular to the field of information security technology, and in particular to a method and device for repairing kernel vulnerabilities. Background technique [0002] The kernel is the core of the operating system, responsible for managing the system's processes, memory, device drivers, files, and network systems, and determines the performance and stability of the system. Because the kernel vulnerability repair code method of replacing the kernel and restarting the system cannot meet the high reliability requirements, a vulnerability repair code technology that supports the function of the kernel to be repaired can be upgraded immediately during the operation of the kernel. The existing kernel hot vulnerability repair code technology repairs kernel functions in the form of memory vulnerability repair code during the kernel running process without replacing the entire kernel, which is benefi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/65
CPCG06F8/656G06F8/65G06F21/57G06F9/445G06F21/577
Inventor 夏良钊郑龙日卢永强包沉浮张煜龙韦韬
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More