summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndrey Konovalov2024-11-01 16:28:29 +0100
committerAndrey Konovalov2024-11-01 16:30:34 +0100
commite7d2b27ca647c3e0bafe934cb37291257a091063 (patch)
tree96ff8d2400fdd1bef83b60ceb289a1f35cbc9a1e
parent70fe788174bc67b7b742bbbf929297d9b6748353 (diff)
Reorganize kernelCTF and Project Zero entries
Diffstat (limited to '')
-rw-r--r--README.md14
1 files changed, 2 insertions, 12 deletions
diff --git a/README.md b/README.md
index f39fd67..f190c78 100644
--- a/README.md
+++ b/README.md
@@ -358,9 +358,9 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
358 358
359## Vulnerabilities 359## Vulnerabilities
360 360
361[Project Zero bug reports](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id) 361[Project Zero bug reports](https://project-zero.issues.chromium.org/issues?q=componentid:1638259%20linux%20kernel)
362 362
363[Linux Kernel CVEs](https://www.linuxkernelcves.com/) 363[Google kernelCTF writeups and exploits](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf)
364 364
365[Assorted advisories by Gyorgy Miru and kutyacica](https://labs.taszk.io/blog/) 365[Assorted advisories by Gyorgy Miru and kutyacica](https://labs.taszk.io/blog/)
366 366
@@ -416,8 +416,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
416 416
417### LPE 417### LPE
418 418
419[2024: "Google: Security Research: CVE-2024-26581](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation/docs) [article] [CVE-2024-26581]
420
421[2024: "Race conditions in Linux Kernel perf events"](https://binarygecko.com/race-conditions-in-linux-kernel-perf-events/) [[code](https://github.com/Binary-Gecko/perf_PoC)] [CVE-UNKNOWN] 419[2024: "Race conditions in Linux Kernel perf events"](https://binarygecko.com/race-conditions-in-linux-kernel-perf-events/) [[code](https://github.com/Binary-Gecko/perf_PoC)] [CVE-UNKNOWN]
422 420
423[2024: "CVE-2020-27786 (Race Condition + Use-After-Free)" by ii4gsp](https://ii4gsp.github.io/cve-2020-27786/) [article] [CVE-2020-27786] 421[2024: "CVE-2020-27786 (Race Condition + Use-After-Free)" by ii4gsp](https://ii4gsp.github.io/cve-2020-27786/) [article] [CVE-2020-27786]
@@ -482,10 +480,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
482 480
483[2023: "Analyzing a Modern In-the-wild Android Exploit" by Seth Jenkins](https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-android-exploit.html) [article] [CVE-2023-0266] [CVE-2023-26083] 481[2023: "Analyzing a Modern In-the-wild Android Exploit" by Seth Jenkins](https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-android-exploit.html) [article] [CVE-2023-0266] [CVE-2023-26083]
484 482
485[2023: "Google: Security Research: CVE-2023-3390](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/docs) [article] [CVE-2023-3390]
486
487[2023: "Google: Security Research: CVE-2023-0461](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2023-0461_mitigation/docs) [article] [CVE-2023-0461]
488
489[2023: "Old bug, shallow bug: Exploiting Ubuntu at Pwn2Own Vancouver 2023" by Tanguy Dubroca](https://www.synacktiv.com/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023) [article] [CVE-2023-35001] 483[2023: "Old bug, shallow bug: Exploiting Ubuntu at Pwn2Own Vancouver 2023" by Tanguy Dubroca](https://www.synacktiv.com/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023) [article] [CVE-2023-35001]
490 484
491[2023: "Linux Kernel Exploit (CVE-2022–32250) with mqueue"](https://blog.theori.io/linux-kernel-exploit-cve-2022-32250-with-mqueue-a8468f32aab5) [article] [CVE-2022–32250] 485[2023: "Linux Kernel Exploit (CVE-2022–32250) with mqueue"](https://blog.theori.io/linux-kernel-exploit-cve-2022-32250-with-mqueue-a8468f32aab5) [article] [CVE-2022–32250]
@@ -1499,10 +1493,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
1499 1493
1500## Exploits 1494## Exploits
1501 1495
1502[Project Zero bug reports](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id)
1503
1504[Google kernelCTF writeups and exploits](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf)
1505
1506https://github.com/bsauce/kernel-exploit-factory 1496https://github.com/bsauce/kernel-exploit-factory
1507 1497
1508https://www.exploit-db.com/search/?action=search&description=linux+kernel 1498https://www.exploit-db.com/search/?action=search&description=linux+kernel