lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 5 Dec 2003 00:04:59 +0100 (CET) From: Paul Starzetz <paul@...c.pl> To: bugtraq@...urityfocus.com, <vulnwatch@...nwatch.org>, <full-disclosure@...ts.netsys.com> Subject: [iSEC] Linux kernel do_brk() vulnerability details -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, We have released a paper covering technical details of the do_brk() bug and the results of our research done while writing the exploit code. It also describes the numerous techniques we have used to create a very effective exploit code that leads to full privilege escalation even on systems running a kernel secured with various security patches. It can be found at: http://isec.pl/papers/linux_kernel_do_brk.pdf Regards, - -- Paul Starzetz iSEC Security Research http://isec.pl/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE/z7vdC+8U3Z5wpu4RAkP0AKDH0sNST6CjjTmIfGTSETSAa922hgCfR3mz tSWdaV41pn1zznrPb/8lQtA= =VOlJ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists