From 3551198f991908ebb07f71f460d8f61788551183 Mon Sep 17 00:00:00 2001
From: Andreas Kling
Date: Sun, 14 Feb 2021 01:32:46 +0100
Subject: [PATCH] Website: Add vakzz's exploit & writeup to the bounty page
---
Meta/Websites/serenityos.org/bounty/index.html | 1 +
1 file changed, 1 insertion(+)
diff --git a/Meta/Websites/serenityos.org/bounty/index.html b/Meta/Websites/serenityos.org/bounty/index.html
index c4c90fdfce4..bab95c35c9c 100644
--- a/Meta/Websites/serenityos.org/bounty/index.html
+++ b/Meta/Websites/serenityos.org/bounty/index.html
@@ -39,6 +39,7 @@
Unclaimed bounties:
+ - 2021-02-11: vakzz wrote the first-ever full chain exploit, stringing together a LibJS bug and a kernel bug to create a web page that got root access when viewed in our browser. (Writeup and exploit)
- 2020-12-22: ALLES! CTF found a kernel LPE due to missing EFLAGS validation in
ptrace()
. (Writeup and exploit)
- 2020-12-20: yyyyyyy found a kernel LPE due to a race condition between
execve()
and ptrace()
. (Writeup and exploit)
- 2019-12-30: Fire30 found a kernel LPE due to bad userspace pointer validation. (Writeup and exploit)