关联漏洞
            
                
                    标题:
                    Linux kernel 资源管理错误漏洞
                        (CVE-2022-32250)
                    
                    描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 5.18.1版本及之前版本存在安全漏洞,该漏洞源于net/netfilter/nf_tables_api.c允许本地用户将权限升级为root用户,攻击者利用该漏洞可导致释放后重用。
                
        
 
        
        
            介绍
            # CVE-2022-32250
This is my exploit for CVE-2022-32250, written entirely based on the research from [NCC Group's blog](https://www.nccgroup.com/us/research-blog/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250).
Tested on: Kernel version 5.13\
Success rate: ~70%

## Building
Building requires `libmnl` and `libnftnl`.
```c
make all
```
## Disclaimer
The Proof-of-Concept and the write-up of the vulnerability are for educational and research purposes only. Use at your own risk.
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/1dfe1b93a262520ebbb678c54f20aa7cf40286e7
├── [   5]  dummy
├── [ 30K]  exploit.c
├── [ 164]  ex.sh
├── [4.2K]  fuse_spray.c
├── [ 208]  fuse_spray.h
├── [ 338]  Makefile
├── [ 237]  monke.c
├── [154K]  poc.png
├── [ 527]  README.md
└── [  78]  x
0 directories, 10 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。