ExploitGSM
ExploitGSM copied to clipboard
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
On at least stock Debian 12 and Ubuntu 22/23, the kallsym table only emits zero address values when called as unprivileged user. The easiest way to circumvent this is to...
https://github.com/jmpe4x/GSM_Linux_Kernel_LPE_Nday_Exploit/tree/main This was pushed 3 weeks ago and the exploit is bar from a few lines identical. The writeup (after translation to english) is also a close copy of https://jmpeax.dev/The-tale-of-a-GSM-Kernel-LPE.html.
hello I have multiples proxmox nodes running on 6.5.13-1-pve, 6.5.13-3-pve, 6.5.13-5-pve Am I vulnerable to this exploit ?
If you're interested in the process, it is documented in kernel and you can see it here: https://lwn.net/ml/linux-kernel/2024021314-unwelcome-shrill-690e@gregkh/
It especcially doesnt like the #define s of lines 154-156 and refuses to compile with them