From mboxrd@z Thu Jan 1 00:00:00 1970 MIME-Version: 1.0 From: Carter Cheng Date: Sun, 10 Feb 2019 19:12:47 +0800 Message-ID: Subject: classes of methods for gaining access to kernel memory Content-Type: multipart/alternative; boundary="00000000000047dfb605818846d0" To: kernel-hardening@lists.openwall.com List-ID: --00000000000047dfb605818846d0 Content-Type: text/plain; charset="UTF-8" Hi, I was reading a paper on kernel data attacks and the paper mentions methods for gaining control of kernel memory beyond overflow type attacks. This would seem to suggest that methods exist for this in certain cases beyond what can be caught by spatial safety checks. Are there general classes of such methods that one needs to be aware of? And what are they? Thanks in advance, --00000000000047dfb605818846d0 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hi,

I was reading a paper on kernel= data attacks and the paper mentions methods for gaining control of kernel = memory beyond overflow type attacks. This would seem to suggest that method= s exist for this in certain cases beyond what can be caught by spatial safe= ty checks. Are there general classes of such methods that one needs to be a= ware of? And what are they?=C2=A0

Thanks in advanc= e,


--00000000000047dfb605818846d0--