hmmm am i too blind ?
<< So , is Kernel Address Space NOT PROTECTED against overflows ??
Clearly yes / no
no as it affects all architecturesDodger wrote:im running Systems with IA64 and NX .... i enabled Pagebased Memory Protection and i have TWO Questions ...
1. Am i safe of this Bug
it depends on the kernel version and architecture, for ia64 i don't know (and am lazy to check2. Is KERNEL Memory also marked as non exec, as this bug seems to rely on kernel stack memory, or am i wrong in this point ?
let's try againDodger wrote:again, im aware that THIS exploit relies on an integer overflow. From my knowledge, PaX is preventing this on PAGE EXEC ia64 protected Systems ...
can anyone tell the real state of this ?