Re: Linux kernel null pointer bug [message #37196 is a reply to message #37195] |
Wed, 26 August 2009 07:17 |
lazy
Messages: 16 Registered: January 2008
|
Junior Member |
|
|
finist wrote on Wed, 26 August 2009 02:54 | Quote: | but still it's possible to destabilize the kernel with a failed exploit attempt
|
Not exactly: you need to modify exploit to do this. But yes, it's possible, but again - from Hardware Node only.
Yes, we've already seen that, thank you.
|
I recall when when I started one of the exploits from 32 bit guest(64 bit host), its process got blocked in kernel space and I couldn't enter any other vps, reboot machine properly etc.
when I have some time I will recheck it (maybe after all I wasn't running 64.4 on that machine) exploit was modified to run without kernel symbols in /proc
patched machines are working fine, is applying mentioned patch is sufficient ? (debian is using this patch for etch kernel so i guess it's safe to think so)
thanks for Your answer
--
Lazy
[Updated on: Wed, 26 August 2009 07:22] Report message to a moderator
|
|
|