Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019

Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019

Linux Foundation via YouTube Direct link

Conventional UAF exploit chain

15 of 19

15 of 19

Conventional UAF exploit chain

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Linux distribution families
  3. 3 Top 6 CWE in Linux kernel
  4. 4 Representative kernel vulnerabilities
  5. 5 Linux privilege escalation
  6. 6 Common LPE flow
  7. 7 Control execution flow
  8. 8 For specific vulnerability types
  9. 9 Get arbitrary memory write
  10. 10 What is addr limit?
  11. 11 Gain root privilege
  12. 12 eBPF verifier bypass vulnerability
  13. 13 Verifier simulation execution
  14. 14 Actual code running
  15. 15 Conventional UAF exploit chain
  16. 16 TOCTOU & pipe subsystem
  17. 17 Combine list operation with pipe heap spray
  18. 18 Case summary
  19. 19 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.