Logo
Explore Help
Sign In
CalvinBackup/CVEs-PoC
1
0
Fork 0
You've already forked CVEs-PoC
mirror of https://github.com/0xMarcio/cve.git synced 2026-05-10 07:47:42 +02:00
Code Issues Packages Projects Releases Wiki Activity
Files
c501997a533f360fd0a20ee53b8314beaab933db
CVEs-PoC/2008/CVE-2008-0010.md
T
0xMarcio 48a00929ac Removed duplicates
2024-06-18 02:51:15 +02:00

1.5 KiB
Raw Blame History

CVE-2008-0010

Description

The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.

POC

Reference

  • https://www.exploit-db.com/exploits/5093

Github

  • https://github.com/ARPSyndicate/cvemon
  • https://github.com/R0B1NL1N/linux-kernel-exploitation
  • https://github.com/Technoashofficial/kernel-exploitation-linux
  • https://github.com/kdn111/linux-kernel-exploitation
  • https://github.com/khanhdn111/linux-kernel-exploitation
  • https://github.com/khanhdz-06/linux-kernel-exploitation
  • https://github.com/khanhdz191/linux-kernel-exploitation
  • https://github.com/khanhhdz/linux-kernel-exploitation
  • https://github.com/khanhhdz06/linux-kernel-exploitation
  • https://github.com/khanhnd123/linux-kernel-exploitation
  • https://github.com/knd06/linux-kernel-exploitation
  • https://github.com/ndk191/linux-kernel-exploitation
  • https://github.com/skbasava/Linux-Kernel-exploit
  • https://github.com/ssr-111/linux-kernel-exploitation
  • https://github.com/xairy/linux-kernel-exploitation
Reference in New Issue View Git Blame Copy Permalink
Powered by Gitea Version: 1.26.0 Page: 116ms Template: 6ms
Auto
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API