-
Notifications
You must be signed in to change notification settings - Fork 412
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kernelCTF: add CVE-2023-3390_lts_cos_mitigation #40
Conversation
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/metadata.json
Outdated
Show resolved
Hide resolved
pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/metadata.json
Outdated
Show resolved
Hide resolved
pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/metadata.json
Outdated
Show resolved
Hide resolved
pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/exploit/cos-105-17412-101.17/Makefile
Outdated
Show resolved
Hide resolved
pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/exploit/refined/Makefile
Outdated
Show resolved
Hide resolved
pocs/linux/kernelctf/CVE-2023-3390_lts_cos_mitigation/exploit/exploit.tar.gz
Outdated
Show resolved
Hide resolved
Hey! Sorry for the late response. We created a Github Actions job to verify the submission PRs. The current test run mostly failed because of the PR's file structure issues, see my suggestions above how to resolve these. You can see the current test run results here: https://github.com/google/security-research/actions/runs/5964212828 After you fix these issues the Github Action will run again, and it will test the exploit compilation and exploit reproduction too. The compilation failed for us with the error The exploit reproduction worked for If the reproduction fails for some other reason too, then please take a look why it fails. The reproduction system is a bit different than the live one (it runs the exploit directly from So feel free to modify the PR and the Github Action will run again and you will see the new verification results. Thank you for your submission and participating in kernelCTF! |
….json Co-authored-by: Tamás Koczka <koczkatamas@gmail.com>
….json Co-authored-by: Tamás Koczka <koczkatamas@gmail.com>
….json Co-authored-by: Tamás Koczka <koczkatamas@gmail.com>
Hello. |
Hey! Thanks for the changes! I solved the CLA issue. Sadly your exploit still does not build, so the reproduction uses the old exploit which still contains the user interaction, so the repro also fails. I also changed the way how the Github Actions job work and hopefully you will be trigger a re-check automatically in the future when you make changes to the PR. I now re-run the checks manually and these are the current results: https://github.com/google/security-research/actions/runs/5969023328 |
No description provided.