[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-Disclosure] Re: Linux kernel do_mremap() proof-of-concept exploit code



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Christophe Devine wrote:

| The following program can be used to test if a x86 Linux system
| is vulnerable to the do_mremap() exploit; use at your own risk.
|
| $ cat mremap_poc.c
|

This didnt do anything on my 2.4.23-grsec kernel.

- --
Daniel
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQE/+vZz1PIgHh6MkiIRAiqNAKCiuyxtA9rgaAS+eT3o9ATvLE7EuQCeJAZP
Xf8JIDehgtGba4b1Eb2Qv0w=
=xyYM
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html