How STACKLEAK improves Linux kernel security?
https://it-events.com/system/attachments/files/000/001/376/original/Alexander_Popov_LinuxPiter2017.pdf?1509782398
https://it-events.com/system/attachments/files/000/001/376/original/Alexander_Popov_LinuxPiter2017.pdf?1509782398
Linux Kernel AF_PACKET Use-After-Free vulnerability
https://blogs.securiteam.com/index.php/archives/3484
https://blogs.securiteam.com/index.php/archives/3484
Kernelpop
kernelpop is a framework for performing automated kernel vulnerability enumeration and exploitation
https://github.com/spencerdodd/kernelpop
kernelpop is a framework for performing automated kernel vulnerability enumeration and exploitation
https://github.com/spencerdodd/kernelpop
GitHub
GitHub - spencerdodd/kernelpop: kernel privilege escalation enumeration and exploitation framework
kernel privilege escalation enumeration and exploitation framework - spencerdodd/kernelpop
Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby's native resolver
https://edoverflow.com/2017/ruby-resolv-bug/
https://edoverflow.com/2017/ruby-resolv-bug/
Edoverflow
Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby's native resolver
Summary This is a security advisory for a bug that I discovered in Resolv::getaddresses that enabled me to bypass multiple Server-Side Request Forgery filters. Applications such as GitLab and HackerOne were affected by this bug. The disclosure of all reports…