Monday, September 7, 2009
the FINAL sock_sendpage() null pointer deref blog post
this is old news now, but everyone has been adding on to their blog posts, and writing more and more shit. hopefully this post will pretty much be a complete list of the serious links surrounding this vuln including exploit code.
here is a pastebin a made of vulnerable distros/kernel versions
Redhat's original article to show the problem in SELinux and mmap_min_addr
cr0.org's advisory
Linux NULL pointer dereference due to incorrect proto_ops initializations on cr0.org (best resource)
RISE security's take of it, but on Power/Cell BE arch
redhat's recommendation on mitigation for the problem.
updated Full Disclosure post
and finally THE PATCH!!! <-- do not download, iz evil +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ and the exploit links *newest to work with COW credentials I.E fedora 11
Linux kernel 2.4/2.6 (32bit) sock_sendpage() local ring0 root exploit (simple ver)
before Brad's( pretty much same as below)
wunderbar_emporium.tgz
ARM Android exploit
PPC/PPC64/x86_64/i386 exploit
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment