From dfca6b03e476f0590d61ff545f62e9fe1387b57f Mon Sep 17 00:00:00 2001
From: Andreas Kling
Date: Mon, 8 Mar 2021 18:30:47 +0100
Subject: [PATCH] Website: Reorganize bounty page history section a little bit
---
Meta/Websites/serenityos.org/bounty/index.html | 7 ++-----
1 file changed, 2 insertions(+), 5 deletions(-)
diff --git a/Meta/Websites/serenityos.org/bounty/index.html b/Meta/Websites/serenityos.org/bounty/index.html
index bead355b92..7558cf65e6 100644
--- a/Meta/Websites/serenityos.org/bounty/index.html
+++ b/Meta/Websites/serenityos.org/bounty/index.html
@@ -30,19 +30,16 @@
Rewarded bounties will be listed here, and I will also make a video dissecting each
exploit and showing what the bug was, and how I fix it.
- Rewarded bounties:
-
To claim a reward, get in touch with me either on IRC (kling on Freenode) or via kling@serenityos.org
- Unclaimed bounties:
+ Past exploits:
- 2021-02-18: cees-elzinga combined a ptrace race condition with an ASLR bypass to modify
/etc/passwd
and become root. (Bug report and exploit)
- 2021-02-11: vakzz wrote the first-ever full chain exploit, stringing together a LibJS bug and a kernel bug to create a web page that got root access when viewed in our browser. (Writeup and exploit)
- 2020-12-22: ALLES! CTF found a kernel LPE due to missing EFLAGS validation in
ptrace()
. (Writeup and exploit)
- 2020-12-20: yyyyyyy found a kernel LPE due to a race condition between
execve()
and ptrace()
. (Writeup and exploit)
+ - 2020-03-30: \0 claimed $5 for reporting that the documentation neglects to mention that the default anon user can use
su
to become root by default. Donated to "Kiwis for Kiwi" charity as per \0's request. Fixed with this commit.
- 2019-12-30: Fire30 found a kernel LPE due to bad userspace pointer validation. (Writeup and exploit)
- 2019-12-29: braindead found a kernel LPE due to a TOCTOU bug in
clock_nanosleep()
. (Writeup and exploit)