Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2016-0728 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2016-0728)
Description:The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
Description
Document on Linux Kernal Vulnerability CVE-2016-0728 and Exploitation
Readme
# Linux-Vulnerability-CVE-2016-0728-and-Exploit
Document on Linux Kernal Vulnerability CVE-2016-0728 and Exploitation

-References-

https://perception-point.io/resources/research/analysis-and-exploitation-of-a-linux-kernel-vulnerability/
https://gist.github.com/PerceptionPointTeam/e9b47cf6a7240ac7b8c5#file-process_keys-c
https://gist.github.com/PerceptionPointTeam/3864cf0c2a77f7ebd1dd#file-leak-https://gist.github.com/PerceptionPointTeam/18b1e86d1c0f8531ff8f
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0728.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728
File Snapshot

[4.0K] /data/pocs/517926fb598f195e237892a48aa8685133e8563a ├── [384K] Linux Kernal Vulnerability CVE-2016-0728 and Exploitation.pdf └── [ 599] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →