diff options
| author | Andrey Konovalov | 2024-11-01 16:28:29 +0100 |
|---|---|---|
| committer | Andrey Konovalov | 2024-11-01 16:30:34 +0100 |
| commit | e7d2b27ca647c3e0bafe934cb37291257a091063 (patch) | |
| tree | 96ff8d2400fdd1bef83b60ceb289a1f35cbc9a1e /README.md | |
| parent | 70fe788174bc67b7b742bbbf929297d9b6748353 (diff) | |
Reorganize kernelCTF and Project Zero entries
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 14 |
1 files changed, 2 insertions, 12 deletions
| @@ -358,9 +358,9 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 358 | 358 | ||
| 359 | ## Vulnerabilities | 359 | ## Vulnerabilities |
| 360 | 360 | ||
| 361 | [Project Zero bug reports](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id) | 361 | [Project Zero bug reports](https://project-zero.issues.chromium.org/issues?q=componentid:1638259%20linux%20kernel) |
| 362 | 362 | ||
| 363 | [Linux Kernel CVEs](https://www.linuxkernelcves.com/) | 363 | [Google kernelCTF writeups and exploits](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf) |
| 364 | 364 | ||
| 365 | [Assorted advisories by Gyorgy Miru and kutyacica](https://labs.taszk.io/blog/) | 365 | [Assorted advisories by Gyorgy Miru and kutyacica](https://labs.taszk.io/blog/) |
| 366 | 366 | ||
| @@ -416,8 +416,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 416 | 416 | ||
| 417 | ### LPE | 417 | ### LPE |
| 418 | 418 | ||
| 419 | [2024: "Google: Security Research: CVE-2024-26581](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation/docs) [article] [CVE-2024-26581] | ||
| 420 | |||
| 421 | [2024: "Race conditions in Linux Kernel perf events"](https://binarygecko.com/race-conditions-in-linux-kernel-perf-events/) [[code](https://github.com/Binary-Gecko/perf_PoC)] [CVE-UNKNOWN] | 419 | [2024: "Race conditions in Linux Kernel perf events"](https://binarygecko.com/race-conditions-in-linux-kernel-perf-events/) [[code](https://github.com/Binary-Gecko/perf_PoC)] [CVE-UNKNOWN] |
| 422 | 420 | ||
| 423 | [2024: "CVE-2020-27786 (Race Condition + Use-After-Free)" by ii4gsp](https://ii4gsp.github.io/cve-2020-27786/) [article] [CVE-2020-27786] | 421 | [2024: "CVE-2020-27786 (Race Condition + Use-After-Free)" by ii4gsp](https://ii4gsp.github.io/cve-2020-27786/) [article] [CVE-2020-27786] |
| @@ -482,10 +480,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 482 | 480 | ||
| 483 | [2023: "Analyzing a Modern In-the-wild Android Exploit" by Seth Jenkins](https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-android-exploit.html) [article] [CVE-2023-0266] [CVE-2023-26083] | 481 | [2023: "Analyzing a Modern In-the-wild Android Exploit" by Seth Jenkins](https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-android-exploit.html) [article] [CVE-2023-0266] [CVE-2023-26083] |
| 484 | 482 | ||
| 485 | [2023: "Google: Security Research: CVE-2023-3390](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/docs) [article] [CVE-2023-3390] | ||
| 486 | |||
| 487 | [2023: "Google: Security Research: CVE-2023-0461](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2023-0461_mitigation/docs) [article] [CVE-2023-0461] | ||
| 488 | |||
| 489 | [2023: "Old bug, shallow bug: Exploiting Ubuntu at Pwn2Own Vancouver 2023" by Tanguy Dubroca](https://www.synacktiv.com/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023) [article] [CVE-2023-35001] | 483 | [2023: "Old bug, shallow bug: Exploiting Ubuntu at Pwn2Own Vancouver 2023" by Tanguy Dubroca](https://www.synacktiv.com/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023) [article] [CVE-2023-35001] |
| 490 | 484 | ||
| 491 | [2023: "Linux Kernel Exploit (CVE-2022–32250) with mqueue"](https://blog.theori.io/linux-kernel-exploit-cve-2022-32250-with-mqueue-a8468f32aab5) [article] [CVE-2022–32250] | 485 | [2023: "Linux Kernel Exploit (CVE-2022–32250) with mqueue"](https://blog.theori.io/linux-kernel-exploit-cve-2022-32250-with-mqueue-a8468f32aab5) [article] [CVE-2022–32250] |
| @@ -1499,10 +1493,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 1499 | 1493 | ||
| 1500 | ## Exploits | 1494 | ## Exploits |
| 1501 | 1495 | ||
| 1502 | [Project Zero bug reports](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id) | ||
| 1503 | |||
| 1504 | [Google kernelCTF writeups and exploits](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf) | ||
| 1505 | |||
| 1506 | https://github.com/bsauce/kernel-exploit-factory | 1496 | https://github.com/bsauce/kernel-exploit-factory |
| 1507 | 1497 | ||
| 1508 | https://www.exploit-db.com/search/?action=search&description=linux+kernel | 1498 | https://www.exploit-db.com/search/?action=search&description=linux+kernel |
