|
|
Subscribe / Log in / New account

The rest of the vmsplice() exploit story

The rest of the vmsplice() exploit story

Posted Mar 5, 2008 21:22 UTC (Wed) by PaXTeam (guest, #24616)
Parent article: The rest of the vmsplice() exploit story

good job Jon, now only one thing is missing: the behaviour on 32 bit vs. 64 bit archs (in
practice that'd be i386 vs. amd64). the issue here becomes clear when one looks at struct
partial_page and realizes that its first two members are int, not long, therefore when
treating them as a struct page *, the userland address the kernel will go to isn't a mere NULL
or PAGE_SIZE anymore (something mmap_min_addr could have protected against) but a high enough
address that makes it indefensible.


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds