From c2c7c7368b749cca5f182b01231c56aac24a5062 Mon Sep 17 00:00:00 2001
From: Andreas Kling
Date: Thu, 18 Feb 2021 12:49:57 +0100
Subject: Website: Add @cees-elzinga's ptrace race + ASLR bypass to bounty page
---
Meta/Websites/serenityos.org/bounty/index.html | 1 +
1 file changed, 1 insertion(+)
diff --git a/Meta/Websites/serenityos.org/bounty/index.html b/Meta/Websites/serenityos.org/bounty/index.html
index bab95c35c9..bead355b92 100644
--- a/Meta/Websites/serenityos.org/bounty/index.html
+++ b/Meta/Websites/serenityos.org/bounty/index.html
@@ -39,6 +39,7 @@
Unclaimed bounties:
+ - 2021-02-18: cees-elzinga combined a ptrace race condition with an ASLR bypass to modify
/etc/passwd
and become root. (Bug report and exploit)
- 2021-02-11: vakzz wrote the first-ever full chain exploit, stringing together a LibJS bug and a kernel bug to create a web page that got root access when viewed in our browser. (Writeup and exploit)
- 2020-12-22: ALLES! CTF found a kernel LPE due to missing EFLAGS validation in
ptrace()
. (Writeup and exploit)
- 2020-12-20: yyyyyyy found a kernel LPE due to a race condition between
execve()
and ptrace()
. (Writeup and exploit)
--
cgit v1.2.3