I created repository for that affection check code by python.
Actually, I can code to real exploit but that is not a good for me because I'm joined workplace.
Anyway, if anyone want to affection check, visit to my github:
https://github.com/mirr81/cve-2026_31431
GitHub - mirr81/cve-2026_31431
Contribute to mirr81/cve-2026_31431 development by creating an account on GitHub.
github.com
Do not ask to exploit code. I never share to that because to much strong and easy.
I beleive to if you can analyse my code, you can make a exploit code by your self.
Anyway, very funny pic in recently life. :D
Additional Note: That already fixed by Oracle with UEK. But Redhat not yet announce to fixes. Maybe that more vulnearable under critical :D
So, recommended to use to Oracle Linux and UEK.
Regards,
Mirr
'Skills > System' 카테고리의 다른 글
| Perf/Blktrace 툴을 이용하여 시스템분석하기 (Case 1 - Async I/O) (0) | 2021.05.01 |
|---|---|
| Swappiness 에 대해서 정확히 알고갑시다. (0) | 2020.03.23 |
| How to mirroring to ULN repository on OL6 ? (0) | 2020.02.05 |
| Kernel dump 분석 추가.. (0) | 2017.04.03 |
| User-space bootless patching - Ksplice (0) | 2016.12.01 |