Lucene search

K
exploitdbGuillaume PELATEDB-ID:21458
HistoryMay 17, 2002 - 12:00 a.m.

Grsecurity Kernel Patch 1.9.4 (Linux Kernel) - Memory Protection

2002-05-1700:00:00
Guillaume PELAT
www.exploit-db.com
29

AI Score

7.4

Confidence

Low

EPSS

0

Percentile

0.4%

source: https://www.securityfocus.com/bid/4762/info

An attacker with root access may be able to write to kernel memory in spite of the security patch provided by grsecurity. The patch operates by redirecting the write() system call, when it is being used to write to a memory device. Unfortunately, there are other methods that can be used to write to kernel memory (such as mapping the device to memory using mmap()). 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21458.tgz

AI Score

7.4

Confidence

Low

EPSS

0

Percentile

0.4%

Related for EDB-ID:21458