On 15 May 2013 12:50, Kees de Jong <keesdej...@gmail.com> wrote: > Gavin, did you use the right exploit? The output looks like it's designed > for a 2.6.37 kernel. I don't have a computer near me to check the exploit > myself. Could you please verify you used the right exploit? Thanks!
Hi Kees, I grabbed the source from here:- http://packetstormsecurity.com/files/121616/semtex.c Compiled it like so:- gavin@caelyn:~$ gcc -O2 semtex.c && ./a.out As soon as I hit enter my kernel panics:- " BUG: unable to handle kernel paging request at xxxxxxxxxxxxx. " gavin@caelyn:~$ uname -a Linux caelyn 3.2.0-4-amd64 #1 SMP Debian 3.2.41-2 x86_64 GNU/Linux gavin@caelyn:~$ gcc -v Using built-in specs. COLLECT_GCC=gcc COLLECT_LTO_WRAPPER=/usr/lib/gcc/x86_64-linux-gnu/4.7/lto-wrapper Target: x86_64-linux-gnu Configured with: ../src/configure -v --with-pkgversion='Debian 4.7.2-5' --with-bugurl=file:///usr/share/doc/gcc-4.7/README.Bugs --enable-languages=c,c++,go,fortran,objc,obj-c++ --prefix=/usr --program-suffix=-4.7 --enable-shared --enable-linker-build-id --with-system-zlib --libexecdir=/usr/lib --without-included-gettext --enable-threads=posix --with-gxx-include-dir=/usr/include/c++/4.7 --libdir=/usr/lib --enable-nls --with-sysroot=/ --enable-clocale=gnu --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-gnu-unique-object --enable-plugin --enable-objc-gc --with-arch-32=i586 --with-tune=generic --enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu --target=x86_64-linux-gnu Thread model: posix gcc version 4.7.2 (Debian 4.7.2-5) Platform: Dell XPS Laptop (Intel Core i7-3612QM) with 16GB RAM. Thanks, Gavin -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAN=HbL+YvwKs99_AW3amHtX-_rKoYwz=yleo4s4xbjvqv_b...@mail.gmail.com