Exploit for CVE-2023-1077
In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.
Published: 2023-03-27
CVSS: 7.0
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Download Exploit for CVE-2023-1077 here:
Use Tor Browser to access .onion links.
Check our team here:
https://tatramed.sk/exploit-1049-cve-2021-26857/

ADRESA
Líščie údolie 9
841 04 Bratislava
Slovenská republika
KONTAKTY
tel. č.:+421 2 6020 2301
tel. č.: +421 2 6020 2351
e-mail: info@tatramed.sk
FAKTURAČNÉ ÚDAJE
IČO: 47025328
DIČ: 2023706751
IČ DPH: SK2023706751
Copyright 2019-2024 TatraMed Software s.r.o. © All Rights Reserved | Made by MERINEO