Linux Kernels vulnerability since 2001 (and still working)
Posted by deepquest on August 16, 2009 – 2:05 pm
Nice work Linus on trying to silently fix an 8 year old vulnerability, leaving vendors without patched kernels for their users. Vulnerability in Linux kernels since 2001. Exploits the vulnerability in all Linux kernels since 2001. Exploit works on all kernels since 2001. Disables SELinux, AppArmor, LSM -- you know the drill. This exploit is a bit be more interactive, involving a simulated russian roulette (hence the video) where there would be a 1 in 6 chance of instead of the box being compromised, it would hot reboot into FreeDOS. The exploit works on 2.4, 2.6, x86, x64, 4k stacks, 8k stacks, with/without cred framework, bypasses mmap_min_addr in any public way possible (auto-detecting which method to use). As always, while in ring0 it provides the added convenience of disabling auditing, SELinux, AppArmor, and all other LSM modules. If SELinux is enforcing, it will also rewrite the SELinux code to fool userland into thinking it remains in enforcing mode. from Spender
Post a reply
You must be logged in to post a comment.