[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040106202706.GC9961@chema.homelinux.org>
From: chema at chema.homelinux.org (José María Mateos)
Subject: Re: Linux kernel do_mremap() proof-of-concept exploit code
El martes 06 de enero a las 20:02, Luke Norman escribi?:
>From what I understand, the exploit _should_ reboot the box if
>vulnerable. At least, that's what happened to me, and the original
>exploit poster clarified that was the exploits intention
That's what happened to me when testing in a 2.4.21 kernel
(Debian packaged).
Regards.
--
** Blog Overflow: http://chema.homelinux.org **
No software patents in Europe
http://EuropeSwPatentFree.hispalinux.es - EuropeSwPatentFree
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040106/cf2d2524/attachment.bin
Powered by blists - more mailing lists