2024-05-26 14:27:05 +02:00
### [CVE-2017-18344](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344)



### Description
The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
### POC
#### Reference
- https://www.exploit-db.com/exploits/45175/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CKExploits/pwnlinux
- https://github.com/anoaghost/Localroot_Compile
- https://github.com/bcoles/kasld
- https://github.com/echo-devim/exploit_linux_kernel4.13
- https://github.com/hikame/docker_escape_pwn
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
2024-06-22 09:37:59 +00:00
- https://github.com/wkhnh06/linux-kernel-exploitation
2024-05-26 14:27:05 +02:00
- https://github.com/xairy/kernel-exploits
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456