a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
Preview meta tags from the a13xp0p0v.github.io website.
Linked Hostnames
21- 10 links toa13xp0p0v.github.io
- 4 links togit.kernel.org
- 4 links togithub.com
- 2 links toelixir.bootlin.com
- 2 links togoogleprojectzero.blogspot.com
- 2 links toman7.org
- 1 link toarxiv.org
- 1 link tocommunity.arm.com
Thumbnail
Search Engine Appearance
Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel
CVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation of the Linux kernel. I discovered and fixed them in January 2021. In this article I describe how to exploit them for local privilege escalation on Fedora 33 Server for x86_64, bypassing SMEP and SMAP.
Bing
Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel
CVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation of the Linux kernel. I discovered and fixed them in January 2021. In this article I describe how to exploit them for local privilege escalation on Fedora 33 Server for x86_64, bypassing SMEP and SMAP.
DuckDuckGo
Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel
CVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation of the Linux kernel. I discovered and fixed them in January 2021. In this article I describe how to exploit them for local privilege escalation on Fedora 33 Server for x86_64, bypassing SMEP and SMAP.
General Meta Tags
12- titleFour Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel | Alexander Popov
- msapplication-TileColor#da532c
- msapplication-config/img/favicons/browserconfig.xml
- theme-color#ffffff
- charsetutf-8
Open Graph Meta Tags
7- og:titleFour Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel
- og:localeen_US
- og:descriptionCVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation of the Linux kernel. I discovered and fixed them in January 2021. In this article I describe how to exploit them for local privilege escalation on Fedora 33 Server for x86_64, bypassing SMEP and SMAP.
- og:urlhttps://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
- og:site_nameAlexander Popov
Twitter Meta Tags
2- twitter:cardsummary
- twitter:site@a13xp0p0v
Link Tags
8- alternatehttps://a13xp0p0v.github.io/feed.xml
- apple-touch-icon/img/favicons/apple-touch-icon.png
- canonicalhttps://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
- icon/img/favicons/favicon-32x32.png
- icon/img/favicons/favicon-16x16.png
Emails
1Links
39- http://zer0con.org/#speaker-section
- https://a13xp0p0v.github.io
- https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
- https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
- https://a13xp0p0v.github.io/2020/11/30/slab-quarantine.html