Skip to content

LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Race Condtiton” which results in “User - After - Free”. Looking at the code, I realized that this could be used to execute my code in the Linux kernel and get LPE on a potential victim.

Notifications You must be signed in to change notification settings

jmpr4xp4xm4n/GSM_Linux_Kernel_LPE_Nday_Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GSM_Linux_Kernel_LPE_Nday_Exploit

LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of vulnerability is a Race Condtiton which results in UAF. Looking at the code, I realized that this could be used to execute my code in the Linux kernel and get LPE on a potential victim.

Writeup can be found here:

https://www.jmpr4xp4x.io/The-tale-of-a-GSM-Kernel-LPE.html

About

LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Race Condtiton” which results in “User - After - Free”. Looking at the code, I realized that this could be used to execute my code in the Linux kernel and get LPE on a potential victim.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published