mirror of
https://github.com/RGBCube/serenity
synced 2026-01-21 09:50:59 +00:00
Previously it was not possible for this function to fail. You could exploit this by triggering the creation of a VMObject whose physical memory range would wrap around the 32-bit limit. It was quite easy to map kernel memory into userspace and read/write whatever you wanted in it. Test: Kernel/bxvga-mmap-kernel-into-userspace.cpp |
||
|---|---|---|
| .. | ||
| bind-local-socket-to-symlink.cpp | ||
| bxvga-mmap-kernel-into-userspace.cpp | ||
| elf-execve-mmap-race.cpp | ||
| elf-symbolication-kernel-read-exploit.cpp | ||
| mmap-write-into-running-programs-executable-file.cpp | ||
| null-deref-close-during-select.cpp | ||
| null-deref-crash-during-pthread_join.cpp | ||
| uaf-close-while-blocked-in-read.cpp | ||