diff options
| author | Andrey Konovalov | 2021-11-03 22:28:21 +0100 |
|---|---|---|
| committer | Andrey Konovalov | 2021-11-03 22:28:21 +0100 |
| commit | ae9241ab8cce58fa89de7e98c8c12bfbf9f2e50c (patch) | |
| tree | 394476b7e9ad8d9e1407f6667dd77bf0686014b2 | |
| parent | 1982b7008a0e459e40576ec5665b31add4e8d8ff (diff) | |
Normalize CVE tags
| -rw-r--r-- | README.md | 16 |
1 files changed, 8 insertions, 8 deletions
| @@ -226,7 +226,7 @@ Subscribe to [@linkersec](https://t.me/linkersec) on Telegram for highlights. | |||
| 226 | 226 | ||
| 227 | ### Info-leaks | 227 | ### Info-leaks |
| 228 | 228 | ||
| 229 | [2021: "Samsung S10+/S9 kernel 4.14 (Android 10) Kernel Function Address (.text) and Heap Address Information Leak"](https://ssd-disclosure.com/ssd-advisory-samsung-s10-s9-kernel-4-14-android-10-kernel-function-address-text-and-heap-address-information-leak/) [article, CVE-TBD] | 229 | [2021: "Samsung S10+/S9 kernel 4.14 (Android 10) Kernel Function Address (.text) and Heap Address Information Leak"](https://ssd-disclosure.com/ssd-advisory-samsung-s10-s9-kernel-4-14-android-10-kernel-function-address-text-and-heap-address-information-leak/) [article] [CVE-TBD] |
| 230 | 230 | ||
| 231 | [2021: "Linux Kernel /proc/pid/syscall information disclosure vulnerability"](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211) [article] [CVE-2020-28588] | 231 | [2021: "Linux Kernel /proc/pid/syscall information disclosure vulnerability"](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211) [article] [CVE-2020-28588] |
| 232 | 232 | ||
| @@ -261,21 +261,21 @@ Subscribe to [@linkersec](https://t.me/linkersec) on Telegram for highlights. | |||
| 261 | 261 | ||
| 262 | ### LPE | 262 | ### LPE |
| 263 | 263 | ||
| 264 | [2021: "Kernel Pwning with eBPF: a Love Story" by Valentina Palmiotti](https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story) [article, CVE-2021-3490] | 264 | [2021: "Kernel Pwning with eBPF: a Love Story" by Valentina Palmiotti](https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story) [article] [CVE-2021-3490] |
| 265 | 265 | ||
| 266 | [2021: "The Art of Exploiting UAF by Ret2bpf in Android Kernel" by Xingyu Jin and Richard Neal](https://conference.hitb.org/hitbsecconf2021sin/materials/D1T1%20-%20%20The%20Art%20of%20Exploiting%20UAF%20by%20Ret2bpf%20in%20Android%20Kernel%20-%20Xingyu%20Jin%20&%20Richard%20Neal.pdf) [slides, CVE-2021-0399] | 266 | [2021: "The Art of Exploiting UAF by Ret2bpf in Android Kernel" by Xingyu Jin and Richard Neal](https://conference.hitb.org/hitbsecconf2021sin/materials/D1T1%20-%20%20The%20Art%20of%20Exploiting%20UAF%20by%20Ret2bpf%20in%20Android%20Kernel%20-%20Xingyu%20Jin%20&%20Richard%20Neal.pdf) [slides] [CVE-2021-0399] |
| 267 | 267 | ||
| 268 | [2021: "Internal of the Android kernel backdoor vulnerability"](https://vul.360.net/archives/263) [article, CVE-2021-28663] | 268 | [2021: "Internal of the Android kernel backdoor vulnerability"](https://vul.360.net/archives/263) [article] [CVE-2021-28663] |
| 269 | 269 | ||
| 270 | [2021: "Escape from chrome sandbox to root"](https://vul.360.net/archives/217) [article, CVE-2020-0423] | 270 | [2021: "Escape from chrome sandbox to root"](https://vul.360.net/archives/217) [article] [CVE-2020-0423] |
| 271 | 271 | ||
| 272 | [2021: "CVE-2017-11176" by Maher Azzouzi](https://github.com/MaherAzzouzi/LinuxKernelStudy/tree/main/CVE-2017-11176) [article] [CVE-2017-11176] | 272 | [2021: "CVE-2017-11176" by Maher Azzouzi](https://github.com/MaherAzzouzi/LinuxKernelStudy/tree/main/CVE-2017-11176) [article] [CVE-2017-11176] |
| 273 | 273 | ||
| 274 | [2021: "Sequoia: A deep root in Linux's filesystem layer (CVE-2021-33909)" by Qualys Research Team](https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt) [article, CVE-2021-33909] | 274 | [2021: "Sequoia: A deep root in Linux's filesystem layer (CVE-2021-33909)" by Qualys Research Team](https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt) [article] [CVE-2021-33909] |
| 275 | 275 | ||
| 276 | [2021: "CVE-2021-22555: Turning \x00\x00 into 10000$" by Andy Nguyen](https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html) [CVE-2021-22555, article] | 276 | [2021: "CVE-2021-22555: Turning \x00\x00 into 10000$" by Andy Nguyen](https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html) [CVE-2021-22555, article] |
| 277 | 277 | ||
| 278 | [2021: "Exploitation of a double free vulnerability in Ubuntu shiftfs driver (CVE-2021-3492)" by Vincent Dehors](https://www.synacktiv.com/publications/exploitation-of-a-double-free-vulnerability-in-ubuntu-shiftfs-driver-cve-2021-3492.html) [article, CVE-2021-3492] | 278 | [2021: "Exploitation of a double free vulnerability in Ubuntu shiftfs driver (CVE-2021-3492)" by Vincent Dehors](https://www.synacktiv.com/publications/exploitation-of-a-double-free-vulnerability-in-ubuntu-shiftfs-driver-cve-2021-3492.html) [article] [CVE-2021-3492] |
| 279 | 279 | ||
| 280 | [2021: "CVE-2021-20226 a reference counting bug which leads to local privilege escalation in io_uring"](https://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a) [article] [CVE-2021–20226] | 280 | [2021: "CVE-2021-20226 a reference counting bug which leads to local privilege escalation in io_uring"](https://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a) [article] [CVE-2021–20226] |
| 281 | 281 | ||
| @@ -375,7 +375,7 @@ Subscribe to [@linkersec](https://t.me/linkersec) on Telegram for highlights. | |||
| 375 | 375 | ||
| 376 | [2019: "Linux kernel 4.20 BPF integer overflow vulnerability analysis"](http://p4nda.top/2019/01/02/kernel-bpf-overflow/) [article] | 376 | [2019: "Linux kernel 4.20 BPF integer overflow vulnerability analysis"](http://p4nda.top/2019/01/02/kernel-bpf-overflow/) [article] |
| 377 | 377 | ||
| 378 | [2019: "Attacking DRM subsystem to gain kernel privilege on Chromebooks" by Di Shen](https://speakerdeck.com/retme7/attacking-drm-subsystem-to-gain-kernel-privilege-on-chromebooks) [slides, CVE-2019-16508] [[video](https://www.youtube.com/watch?v=lBgtZvIxEwA)] | 378 | [2019: "Attacking DRM subsystem to gain kernel privilege on Chromebooks" by Di Shen](https://speakerdeck.com/retme7/attacking-drm-subsystem-to-gain-kernel-privilege-on-chromebooks) [slides] [[video](https://www.youtube.com/watch?v=lBgtZvIxEwA)] [CVE-2019-16508] |
| 379 | 379 | ||
| 380 | [2018: "Linux kernel 4.20 BPF integer overflow-heap overflow vulnerability and its exploitation"](https://www.anquanke.com/post/id/166819) [article] | 380 | [2018: "Linux kernel 4.20 BPF integer overflow-heap overflow vulnerability and its exploitation"](https://www.anquanke.com/post/id/166819) [article] |
| 381 | 381 | ||
