A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
- http://seclists.org/fulldisclosure/2023/Jul/43
- http://www.openwall.com/lists/oss-security/2023/07/28/1
- http://www.openwall.com/lists/oss-security/2023/08/25/4
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/FawazMalik-jjj/CONTAIN-SEC-FALCON
- https://github.com/GhostTroops/TOP
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
- https://github.com/LumaKernel/awesome-stars
- https://github.com/Metarget/metarget
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/aneasystone/github-trending
- https://github.com/freitzzz/stars
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/hktalent/TOP
- https://github.com/izj007/wechat
- https://github.com/joaomagfreitas/stars
- https://github.com/johe123qwe/github-trending
- https://github.com/kherrick/hacker-news
- https://github.com/kun-g/Scraping-Github-trending
- https://github.com/lrh2000/StackRot
- https://github.com/nisadevi11/Localroot-ALL-CVE
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/whoami13apt/files2
- https://github.com/xairy/linux-kernel-exploitation