# CVE-2017-8890
相关文档:
- [ubuntu 内核双机调试方法](https://thinkycx.me/posts/2018-08-08-how-to-debug-ubuntu-kernel-with-2-VM.html)
- [CVE-2017-8890漏洞分析和利用-概览篇](https://thinkycx.me/posts/2018-10-30-a-glance-at-CVE-2017-8890.html)
- [CVE-2017-8890 漏洞分析 原理篇](https://thinkycx.me/posts/2018-08-08-CVE-2017-8890-analysis.html)
- [CVE-2017-8890 漏洞利用(root ubuntu 16.04@kernel 4.10)](https://thinkycx.me/posts/2018-08-09-CVE-2017-8890-root-ubuntu-16.04-kernel-4.10.html)
- [CVE-2017-8890 漏洞利用 (root nexus6p@kernel 3.10)](https://thinkycx.me/posts/2018-08-09-CVE-2017-8890-root-nexus6p-kernel-3.10.html)
[4.0K] /data/pocs/597d364c2ab2ad5852512fd847369b42a543a010
├── [4.0K] nexus6p@kernel-3.10
│ ├── [ 90] 1.bat
│ ├── [901K] CVE-2017-8890-nexus6p@kernel3.10.gif
│ └── [4.0K] jni
│ ├── [ 289] Android.mk
│ ├── [ 72] Application.mk
│ ├── [ 28K] exp.c
│ ├── [ 12K] exp-hardenedlinux.c
│ ├── [ 524] Makefile
│ ├── [ 604] one_igmp.h
│ ├── [3.8K] utils.c
│ └── [3.9K] utils.h
├── [ 666] README.md
└── [4.0K] ubuntu-16.04.1@kernel-4.10.0-19
├── [ 20K] 20180629-debug-8890-internals-log.txt
├── [178K] CVE-2017-8890-ubuntu16.04.1@kernel-4.10.0-19.png
├── [ 17K] exp-bypasssmep.c
├── [ 11K] exp-nosmep.c
├── [8.8K] poc.c
└── [9.7K] poc-context.c
3 directories, 17 files