• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    公众号

xairy/kernel-exploits: My proof-of-concept exploits for the Linux kernel

原作者: [db:作者] 来自: 网络 收藏 邀请

开源软件名称(OpenSource Name):

xairy/kernel-exploits

开源软件地址(OpenSource Url):

https://github.com/xairy/kernel-exploits

开源编程语言(OpenSource Language):

C 96.9%

开源软件介绍(OpenSource Introduction):

Linux kernel exploits

Date Link Description Vector Impact
02.2016 CVE-2016-2384 Double-free in USB MIDI driver Physical + Local LPE
03.2016 prefetch-side-channel KASLR bypass via prefetch Local Info-leak
12.2016 CVE-2016-9793 Signedness issue with socket buffers Local + cap_net_admin LPE
02.2017 CVE-2017-6074 Double-free in DCCP sockets Local LPE
03.2017 CVE-2017-7308 Signedness issue in AF_PACKET sockets Local LPE
08.2017 CVE-2017-1000112 Memory corruption in UDP FO packets Local LPE
08.2018 CVE-2017-18344 Arbitrary-read in the timer subsystem Local Info-leak

No license

The code in this repository comes with no attached license.

THE SOFTWARE [and this disclaimer] IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.




鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
热门推荐
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap