From 0918dd0460b40be080f5f36dc368e7449a5a8fcb Mon Sep 17 00:00:00 2001
From: Andreas Kling
Date: Mon, 8 Mar 2021 18:31:18 +0100
Subject: Website: Add link to @ABigPickle's VLA exploit
---
Meta/Websites/serenityos.org/bounty/index.html | 1 +
1 file changed, 1 insertion(+)
(limited to 'Meta/Websites/serenityos.org/bounty/index.html')
diff --git a/Meta/Websites/serenityos.org/bounty/index.html b/Meta/Websites/serenityos.org/bounty/index.html
index 7558cf65e6..24d107d683 100644
--- a/Meta/Websites/serenityos.org/bounty/index.html
+++ b/Meta/Websites/serenityos.org/bounty/index.html
@@ -35,6 +35,7 @@
Past exploits:
+ - 2021-03-04: Iliad used a VLA stack overflow in the TCP implementation to smash a nearby kernel stack and become root. (Writeup and exploit)
- 2021-02-18: cees-elzinga combined a ptrace race condition with an ASLR bypass to modify
/etc/passwd
and become root. (Bug report and exploit)
- 2021-02-11: vakzz wrote the first-ever full chain exploit, stringing together a LibJS bug and a kernel bug to create a web page that got root access when viewed in our browser. (Writeup and exploit)
- 2020-12-22: ALLES! CTF found a kernel LPE due to missing EFLAGS validation in
ptrace()
. (Writeup and exploit)
--
cgit v1.2.3