search PRIV & ALL sites linked here

Monday, September 7, 2009

the FINAL sock_sendpage() null pointer deref blog post



this is old news now, but everyone has been adding on to their blog posts, and writing more and more shit. hopefully this post will pretty much be a complete list of the serious links surrounding this vuln including exploit code.

here is a pastebin a made of vulnerable distros/kernel versions

Redhat's original article to show the problem in SELinux and mmap_min_addr

cr0.org's advisory

Linux NULL pointer dereference due to incorrect proto_ops initializations on cr0.org (best resource)

RISE security's take of it, but on Power/Cell BE arch

redhat's recommendation on mitigation for the problem.

updated Full Disclosure post

and finally THE PATCH!!! <-- do not download, iz evil +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ and the exploit links *newest to work with COW credentials I.E fedora 11

Linux kernel 2.4/2.6 (32bit) sock_sendpage() local ring0 root exploit (simple ver)

before Brad's( pretty much same as below)

wunderbar_emporium.tgz

ARM Android exploit

PPC/PPC64/x86_64/i386 exploit

No comments:

Post a Comment