ExploitGSM icon indicating copy to clipboard operation
ExploitGSM copied to clipboard

Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5

Results 5 ExploitGSM issues
Sort by recently updated
recently updated
newest added

On at least stock Debian 12 and Ubuntu 22/23, the kallsym table only emits zero address values when called as unprivileged user. The easiest way to circumvent this is to...

https://github.com/jmpe4x/GSM_Linux_Kernel_LPE_Nday_Exploit/tree/main This was pushed 3 weeks ago and the exploit is bar from a few lines identical. The writeup (after translation to english) is also a close copy of https://jmpeax.dev/The-tale-of-a-GSM-Kernel-LPE.html.

hello I have multiples proxmox nodes running on 6.5.13-1-pve, 6.5.13-3-pve, 6.5.13-5-pve Am I vulnerable to this exploit ?

If you're interested in the process, it is documented in kernel and you can see it here: https://lwn.net/ml/linux-kernel/2024021314-unwelcome-shrill-690e@gregkh/

It especcially doesnt like the #define s of lines 154-156 and refuses to compile with them