Daniel Husand <io@naiv.us> wrote:From what I understand, the exploit _should_ reboot the box if vulnerable. At least, that's what happened to me, and the original exploit poster clarified that was the exploits intention
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Christophe Devine wrote:
| The following program can be used to test if a x86 Linux system | is vulnerable to the do_mremap() exploit; use at your own risk. | | $ cat mremap_poc.c |
This didnt do anything on my 2.4.23-grsec kernel.
- --
Daniel
This froze my box running 2.6.0, was that the intention? (I think so..)
Regards, Daniel.
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html