Blog
Aug 16, 2009
Kernel whoops in BackTrack 4
Linux Kernel ‘sock_sendpage()’ NULL Pointer Dereference vulnerability patched in BackTrack 4
1 min read

The latest Linux Kernel ‘sock_sendpage()’ NULL Pointer Dereference Vulnerability did not spare BackTrack 4 either. We’ve taken this opportunity to upgrade the BackTrack 4 kernel and include the required security patch.
The patched kernel source and image can be downloaded here :
BackTrack 4 Kernel Image (2.6.30.4) BackTrack 4 Kernel Source (2.6.30.4) *Links removed*
The repositories will be updated soon, to include additional drivers compiled against this kernel.
Once we are done with testing, a complete upgrade howto will be posted, hang in there!
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences.
May 15, 2025
3 min read

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read