From e7d2b27ca647c3e0bafe934cb37291257a091063 Mon Sep 17 00:00:00 2001 From: Andrey Konovalov Date: Fri, 1 Nov 2024 16:28:29 +0100 Subject: Reorganize kernelCTF and Project Zero entries --- README.md | 14 ++------------ 1 file changed, 2 insertions(+), 12 deletions(-) diff --git a/README.md b/README.md index f39fd67..f190c78 100644 --- a/README.md +++ b/README.md @@ -358,9 +358,9 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). ## Vulnerabilities -[Project Zero bug reports](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id) +[Project Zero bug reports](https://project-zero.issues.chromium.org/issues?q=componentid:1638259%20linux%20kernel) -[Linux Kernel CVEs](https://www.linuxkernelcves.com/) +[Google kernelCTF writeups and exploits](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf) [Assorted advisories by Gyorgy Miru and kutyacica](https://labs.taszk.io/blog/) @@ -416,8 +416,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). ### LPE -[2024: "Google: Security Research: CVE-2024-26581](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation/docs) [article] [CVE-2024-26581] - [2024: "Race conditions in Linux Kernel perf events"](https://binarygecko.com/race-conditions-in-linux-kernel-perf-events/) [[code](https://github.com/Binary-Gecko/perf_PoC)] [CVE-UNKNOWN] [2024: "CVE-2020-27786 (Race Condition + Use-After-Free)" by ii4gsp](https://ii4gsp.github.io/cve-2020-27786/) [article] [CVE-2020-27786] @@ -482,10 +480,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). [2023: "Analyzing a Modern In-the-wild Android Exploit" by Seth Jenkins](https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-android-exploit.html) [article] [CVE-2023-0266] [CVE-2023-26083] -[2023: "Google: Security Research: CVE-2023-3390](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/docs) [article] [CVE-2023-3390] - -[2023: "Google: Security Research: CVE-2023-0461](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2023-0461_mitigation/docs) [article] [CVE-2023-0461] - [2023: "Old bug, shallow bug: Exploiting Ubuntu at Pwn2Own Vancouver 2023" by Tanguy Dubroca](https://www.synacktiv.com/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023) [article] [CVE-2023-35001] [2023: "Linux Kernel Exploit (CVE-2022–32250) with mqueue"](https://blog.theori.io/linux-kernel-exploit-cve-2022-32250-with-mqueue-a8468f32aab5) [article] [CVE-2022–32250] @@ -1499,10 +1493,6 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). ## Exploits -[Project Zero bug reports](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id) - -[Google kernelCTF writeups and exploits](https://github.com/google/security-research/tree/master/pocs/linux/kernelctf) - https://github.com/bsauce/kernel-exploit-factory https://www.exploit-db.com/search/?action=search&description=linux+kernel -- cgit v1.3