 
      
    | You are here | yurisk.info | ||
| | | | | blog.dornea.nu | |
| | | | | ||
| | | | | www.lab539.com | |
| | | | | This LimaCharlie lookup allows you to check whether binaries being executed on your Linux system are known malware and create rules or actions that trigger if so. This is a free lookup provided by Lab539 which pulls from various sources including our own sensor network. | |
| | | | | idea.popcount.org | |
| | | | | ||
| | | | | github.blog | |
| | | In this post Ill exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights the strong primitives that an attacker may gain by exploiting errors in the memory management code of GPU drivers. | ||