Linux kernel do_brk() exploit

The Linux kernel function do_brk(), which handles the brk() syscall used by programs to increase or decrease the amount of heap memory they are using, does not sanity-check its argument. This module exploits this bug and writes to kernel memory in order to execute privileged code. This bug can even be exploited on a hardened Linux kernel, patched with PaX or grsecurity for instance.
Exploit Platform
Product Name