Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/secwiki/linux-kernel-exploits

linux-kernel-exploits Linux平台提权漏洞集合
https://github.com/secwiki/linux-kernel-exploits

List: linux-kernel-exploits

awesome collection exploit kernel linux pentest tool

Last synced: about 2 months ago
JSON representation

linux-kernel-exploits Linux平台提权漏洞集合

Awesome Lists containing this project

README

        

# linux-kernel-exploits

### 简介

linux-kernel-exploits

***

#### 漏洞列表
#### #CVE  #Description  #Kernels

- [CVE–2018–18955](./2018/CVE-2018-18955)  [map_write() in kernel/user_namespace.c allows privilege escalation]
(Linux kernel 4.15.x through 4.19.x before 4.19.2)

- [CVE–2018–1000001](./2018/CVE–2018–1000001)  [glibc]
(glibc <= 2.26)

- [CVE-2017-1000367](./2017/CVE-2017-1000367)  [Sudo]
(Sudo 1.8.6p7 - 1.8.20)

- [CVE-2017-1000112](./2017/CVE-2017-1000112)  [a memory corruption due to UFO to non-UFO path switch]

- [CVE-2017-16995](./2017/CVE-2017-16995)  [Memory corruption caused by BPF verifier]
(Linux kernel before 4.14 - 4.4)

- [CVE-2017-16939](./2017/CVE-2017-16939)  [UAF in Netlink socket subsystem – XFRM]
(Linux kernel before 4.13.11)

- [CVE-2017-7494](./2017/CVE-2017-7494)  [Samba Remote execution]
(Samba 3.5.0-4.6.4/4.5.10/4.4.14)

- [CVE-2017-7308](./2017/CVE-2017-7308)  [a signedness issue in AF\_PACKET sockets]
(Linux kernel through 4.10.6)

- [CVE-2017-6074](./2017/CVE-2017-6074)  [a double-free in DCCP protocol]
(Linux kernel through 4.9.11)

- [CVE-2017-5123](./2017/CVE-2017-5123)  ['waitid()']
(Kernel 4.14.0-rc4+)

- [CVE-2016-9793](./2016/CVE-2016-9793)  [a signedness issue with SO\_SNDBUFFORCE and SO\_RCVBUFFORCE socket options]
(Linux kernel before 4.8.14)

- [CVE-2016-5195](./2016/CVE-2016-5195)  [Dirty cow]
(Linux kernel>2.6.22 (released in 2007))

- [CVE-2016-2384](./2016/CVE-2016-2384)  [a double-free in USB MIDI driver]
(Linux kernel before 4.5)

- [CVE-2016-0728](./2016/CVE-2016-0728)  [pp_key]
(3.8.0, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.8.6, 3.8.7, 3.8.8, 3.8.9, 3.9, 3.10, 3.11, 3.12, 3.13, 3.4.0, 3.5.0, 3.6.0, 3.7.0, 3.8.0, 3.8.5, 3.8.6, 3.8.9, 3.9.0, 3.9.6, 3.10.0, 3.10.6, 3.11.0, 3.12.0, 3.13.0, 3.13.1)

- [CVE-2015-7547](./2015/CVE-2015-7547)  [glibc getaddrinfo]
(before Glibc 2.9)

- [CVE-2015-1328](./2015/CVE-2015-1328)  [overlayfs]
(3.13, 3.16.0, 3.19.0)

- [CVE-2014-5284](./2014/CVE-2014-5284)  [OSSEC]
(2.8)

- [CVE-2014-4699](./2014/CVE-2014-4699)  [ptrace]
(before 3.15.4)

- [CVE-2014-4014](./2014/CVE-2014-4014)  [Local Privilege Escalation]
(before 3.14.8)

- [CVE-2014-3153](./2014/CVE-2014-3153)  [futex]
(3.3.5 ,3.3.4 ,3.3.2 ,3.2.13 ,3.2.9 ,3.2.1 ,3.1.8 ,3.0.5 ,3.0.4 ,3.0.2 ,3.0.1 ,2.6.39 ,2.6.38 ,2.6.37 ,2.6.35 ,2.6.34 ,2.6.33 ,2.6.32 ,2.6.9 ,2.6.8 ,2.6.7 ,2.6.6 ,2.6.5 ,2.6.4 ,3.2.2 ,3.0.18 ,3.0 ,2.6.8.1)

- [CVE-2014-0196](./2014/CVE-2014-0196)  [rawmodePTY]
(2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36, 2.6.37, 2.6.38, 2.6.39, 3.14, 3.15)

- [CVE-2014-0038](./2014/CVE-2014-0038)  [timeoutpwn]
(3.4, 3.5, 3.6, 3.7, 3.8, 3.8.9, 3.9, 3.10, 3.11, 3.12, 3.13, 3.4.0, 3.5.0, 3.6.0, 3.7.0, 3.8.0, 3.8.5, 3.8.6, 3.8.9, 3.9.0, 3.9.6, 3.10.0, 3.10.6, 3.11.0, 3.12.0, 3.13.0, 3.13.1)

- [CVE-2013-2094](./2013/CVE-2013-2094)  [perf_swevent]
(3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0, 3.2, 3.3, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.5, 3.4.6, 3.4.8, 3.4.9, 3.5, 3.6, 3.7, 3.8.0, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.8.6, 3.8.7, 3.8.8, 3.8.9)

- [CVE-2013-1858](./2013/CVE-2013-1858)  [clown-newuser]
(3.3-3.8)

- [CVE-2013-1763](./2013/CVE-2013-1763)  [__sock_diag_rcv_msg]
(before 3.8.3)

- [CVE-2013-0268](./2013/CVE-2013-0268)  [msr]
(2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36, 2.6.37, 2.6.38, 2.6.39, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7.0, 3.7.6)

- [CVE-2012-3524](./2012/CVE-2012-3524)  [libdbus]
(libdbus 1.5.x and earlier)

- [CVE-2012-0056](./2012/CVE-2012-0056)  [memodipper]
(2.6.39, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0)

- [CVE-2010-4347](./2010/CVE-2010-4347)  [american-sign-language]
( 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

- [CVE-2010-4258](./2010/CVE-2010-4258)  [full-nelson]
(2.6.31, 2.6.32, 2.6.35, 2.6.37)

- [CVE-2010-4073](./2010/CVE-2010-4073)  [half_nelson]
(2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

- [CVE-2010-3904](./2010/CVE-2010-3904)  [rds]
(2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

- [CVE-2010-3437](./2010/CVE-2010-3437)  [pktcdvd]
(2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

- [CVE-2010-3301](./2010/CVE-2010-3301)  [ptrace_kmod2]
(2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34)

- [CVE-2010-3081](./2010/CVE-2010-3081)  [video4linux]
(2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33)

- [CVE-2010-2959](./2010/CVE-2010-2959)  [can_bcm]
(2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

- [CVE-2010-1146](./2010/CVE-2010-1146)  [reiserfs]
(2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34)

- [CVE-2010-0415](./2010/CVE-2010-0415)  [do_pages_move]
(2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31)

- [CVE-2009-3547](./2009/CVE-2009-3547)  [pipe.c_32bit]
(2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.20, 2.4.21, 2.4.22, 2.4.23, 2.4.24, 2.4.25, 2.4.26, 2.4.27, 2.4.28, 2.4.29, 2.4.30, 2.4.31, 2.4.32, 2.4.33, 2.4.34, 2.4.35, 2.4.36, 2.4.37, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31)

- [CVE-2009-2698](./2009/CVE-2009-2698)  [udp_sendmsg_32bit]
(2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19)

- [CVE-2009-2692](./2009/CVE-2009-2692)  [sock_sendpage]
(2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.20, 2.4.21, 2.4.22, 2.4.23, 2.4.24, 2.4.25, 2.4.26, 2.4.27, 2.4.28, 2.4.29, 2.4.30, 2.4.31, 2.4.32, 2.4.33, 2.4.34, 2.4.35, 2.4.36, 2.4.37, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30)

- [CVE-2009-2692](./2009/CVE-2009-2692)  [sock_sendpage2]
(2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.20, 2.4.21, 2.4.22, 2.4.23, 2.4.24, 2.4.25, 2.4.26, 2.4.27, 2.4.28, 2.4.29, 2.4.30, 2.4.31, 2.4.32, 2.4.33, 2.4.34, 2.4.35, 2.4.36, 2.4.37, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30)

- [CVE-2009-1337](./2009/CVE-2009-1337)  [exit_notify]
(2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29)

- [CVE-2009-1185](./2009/CVE-2009-1185)  [udev]
(2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29)

- [CVE-2008-4210](./2008/CVE-2008-4210)  [ftrex]
(2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22)

- [CVE-2008-0600](./2008/CVE-2008-0600)  [vmsplice2]
(2.6.23, 2.6.24)

- [CVE-2008-0600](./2008/CVE-2008-0600)  [vmsplice1]
(2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.24.1)

- [CVE-2006-3626](./2006/CVE-2006-3626)  [h00lyshit]
(2.6.8, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16)

- [CVE-2006-2451](./2006/CVE-2006-2451)  [raptor_prctl]
(2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17)

- [CVE-2005-0736](./2005/CVE-2005-0736)  [krad3]
(2.6.5, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11)

- [CVE-2005-1263](./2005/CVE-2005-1263)  [binfmt_elf.c]
(Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4)

- [CVE-2004-1235](./2004/CVE-2004-1235)  [elflbl]
(2.4.29)

- [CVE-N/A](./2004/caps_to_root)  [caps_to_root]
(2.6.34, 2.6.35, 2.6.36)

- [CVE-2004-0077](./2004/CVE-2004-0077)  [mremap_pte]
(2.4.20, 2.2.24, 2.4.25, 2.4.26, 2.4.27)

### 工具
- [Linux_Exploit_Suggester](https://github.com/PenturaLabs/Linux_Exploit_Suggester) [@PenturaLabs](https://github.com/PenturaLabs/Linux_Exploit_Suggester)
- [mzet-/linux-exploit-suggester](https://github.com/mzet-/linux-exploit-suggester)
- [jondonas/linux-exploit-suggester-2](https://github.com/jondonas/linux-exploit-suggester-2/blob/master/linux-exploit-suggester-2.pl)
- [spencerdodd/kernelpop](https://github.com/spencerdodd/kernelpop)

### 项目维护

+ **ourren**(sina weibo @ourren)
+ **hx**(sina weibo @hx)
+ **CaledoniaProject**(github @CaledoniaProject)

### 免责说明

请勿用于非法的用途,否则造成的严重后果与本项目无关。

### 参考链接

- [kernel exploits](https://www.kernel-exploits.com/)
- [Unix-Privilege-Escalation-Exploits-Pack](https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack/)
- [A bunch of proof-of-concept exploits for the Linux kernel](https://github.com/xairy/kernel-exploits)
- [kernel-exploits](https://github.com/lucyoa/kernel-exploits)

### 转载

转载请注明来自https://github.com/SecWiki/linux-kernel-exploits

### 补充完善
欢迎大家帮助补充完善 [[email protected]]([email protected])  

©SecWiki 2017