a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
Preview meta tags from the a13xp0p0v.github.io website.
Linked Hostnames
16- 7 links toa13xp0p0v.github.io
- 4 links tolore.kernel.org
- 3 links togithub.com
- 2 links totwitter.com
- 1 link tocommunity.arm.com
- 1 link toduasynt.com
- 1 link toelixir.bootlin.com
- 1 link togrsecurity.net
Thumbnail
Search Engine Appearance
CVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem
This article discloses exploitation of CVE-2019-18683, which refers to multiple five-year-old race conditions in the V4L2 subsystem of the Linux kernel. I found and fixed them at the end of 2019. Here I'm going to describe a PoC exploit for x86_64 that gains local privilege escalation from the kernel thread context (where the userspace is not mapped), bypassing KASLR, SMEP, and SMAP on Ubuntu Server 18.04.
Bing
CVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem
This article discloses exploitation of CVE-2019-18683, which refers to multiple five-year-old race conditions in the V4L2 subsystem of the Linux kernel. I found and fixed them at the end of 2019. Here I'm going to describe a PoC exploit for x86_64 that gains local privilege escalation from the kernel thread context (where the userspace is not mapped), bypassing KASLR, SMEP, and SMAP on Ubuntu Server 18.04.
DuckDuckGo
CVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem
This article discloses exploitation of CVE-2019-18683, which refers to multiple five-year-old race conditions in the V4L2 subsystem of the Linux kernel. I found and fixed them at the end of 2019. Here I'm going to describe a PoC exploit for x86_64 that gains local privilege escalation from the kernel thread context (where the userspace is not mapped), bypassing KASLR, SMEP, and SMAP on Ubuntu Server 18.04.
General Meta Tags
12- titleCVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem | Alexander Popov
- msapplication-TileColor#da532c
- msapplication-config/img/favicons/browserconfig.xml
- theme-color#ffffff
- charsetutf-8
Open Graph Meta Tags
7- og:titleCVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem
- og:localeen_US
- og:descriptionThis article discloses exploitation of CVE-2019-18683, which refers to multiple five-year-old race conditions in the V4L2 subsystem of the Linux kernel. I found and fixed them at the end of 2019. Here I'm going to describe a PoC exploit for x86_64 that gains local privilege escalation from the kernel thread context (where the userspace is not mapped), bypassing KASLR, SMEP, and SMAP on Ubuntu Server 18.04.
- og:urlhttps://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
- og:site_nameAlexander Popov
Twitter Meta Tags
2- twitter:cardsummary
- twitter:site@a13xp0p0v
Link Tags
8- alternatehttps://a13xp0p0v.github.io/feed.xml
- apple-touch-icon/img/favicons/apple-touch-icon.png
- canonicalhttps://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
- icon/img/favicons/favicon-32x32.png
- icon/img/favicons/favicon-16x16.png
Emails
1Links
28- https://a13xp0p0v.github.io
- https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
- https://a13xp0p0v.github.io/about
- https://a13xp0p0v.github.io/articles
- https://a13xp0p0v.github.io/conference_talks