
Aug 16, 2009
Kernel whoops in BackTrack 4
Linux Kernel ‘sock_sendpage()’ NULL Pointer Dereference vulnerability patched in BackTrack 4
The latest Linux Kernel ‘sock_sendpage()’ NULL Pointer Dereference Vulnerability did not spare BackTrack 4 either. We’ve taken this opportunity to upgrade the BackTrack 4 kernel and include the required security patch.
The patched kernel source and image can be downloaded here :
BackTrack 4 Kernel Image (2.6.30.4) BackTrack 4 Kernel Source (2.6.30.4) *Links removed*
The repositories will be updated soon, to include additional drivers compiled against this kernel.
Once we are done with testing, a complete upgrade howto will be posted, hang in there!
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-21683 – Authenticated RCE via “Add a New Language” in Atlassian Confluence
Critical RCE vulnerability (CVE-2024-21683) in Atlassian Confluence Data Center and Server (v5.2–8.9.0) allows authenticated users to execute arbitrary code via malicious code macros.
Jun 12, 2025
2 min read

Research & Tutorials
CVE‑2025‑49113 – Post‑Auth Remote Code Execution in Roundcube via PHP Object Deserialization
A critical RCE vulnerability (CVSS 9.9) in Roundcube Webmail (
Jun 12, 2025
3 min read

Research & Tutorials
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
Jun 5, 2025
2 min read