lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 3 Feb 2009 17:36:13 +0100 (CET)
From:	Christian Kujau <lists@...dbynature.de>
To:	Alex <eosyop@...il.com>
cc:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [kernel] Question about 2.6.28 kernel

On Tue, 3 Feb 2009, Alex wrote:
> Thanks for reply. Here is the post, it appears when i try to write into
> kernel memory.  :

Thanks for the Oops. But again, you might have to share a little more 
information, either here on lkml on with the security team. I'm no kernel 
developer but I wonder *what exactly* are you doing to produce this Oops.

> Pid: 3887, comm: insmod Not tainted (2.6.28 #2) HP Pavilion dv2700

Which module did you just insert? Is it your own trying to write to kernel 
memory? Can we see the source of that? However, since you're are root 
anyway to load this module, you can of course do all kinds of shenanigans 
to memory and the kernel might just Oops rightfully so.

Christian.
-- 
BOFH excuse #17:

fat electrons in the lines
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ