[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] Re: Linux kernel do_mremap() proof-of-concept exploit code
- To: full-disclosure@lists.netsys.com
- Subject: [Full-Disclosure] Re: Linux kernel do_mremap() proof-of-concept exploit code
- From: Daniel Husand <io@naiv.us>
- Date: Tue, 06 Jan 2004 18:54:59 +0100
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Christophe Devine wrote:
| The following program can be used to test if a x86 Linux system
| is vulnerable to the do_mremap() exploit; use at your own risk.
|
| $ cat mremap_poc.c
|
This didnt do anything on my 2.4.23-grsec kernel.
- --
Daniel
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQE/+vZz1PIgHh6MkiIRAiqNAKCiuyxtA9rgaAS+eT3o9ATvLE7EuQCeJAZP
Xf8JIDehgtGba4b1Eb2Qv0w=
=xyYM
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html