Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1015 PoC — Linux kernel 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 缓冲区错误漏洞 (CVE-2022-1015)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux 内核存在安全漏洞,该漏洞源于在netfilter子系统的linux/net/netfilter/nf_tables_api.c中存在Linux内核的一个缺陷。 此漏洞允许本地用户导致越界写入问题。 攻击者可以通过nft_expr_payload触发 Linux 内核的内存损坏,从而触发拒绝服务,并可能运行代码。
Readme
# CVE-2022-1015

target: [linux kernel 5.17.0](https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/linux-5.17.tar.gz)\
config: [.config](./.config)


requirements:
```c
apt install libmnl-dev libnftnl-dev
```

build:
```c
gcc exploit.c -o exploit -lmnl -lnftnl -lpthread -no-pie
```

# References
- https://web.archive.org/web/20240714125127/https://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
- https://anatomic.rip/cve-2022-1015/
- https://www.vicarius.io/vsociety/posts/cve-2022-1015-nftables-out-of-bounds-access-lpe
File Snapshot

[4.0K] /data/pocs/5e44690d8531b89e8c0b22bbf260a7b05317d96d ├── [ 19K] exploit.c └── [ 552] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.