Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0185 PoC — Linux kernel 数字错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 数字错误漏洞 (CVE-2022-0185)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在数字错误漏洞,该漏洞源于在 Linux kernel 的 Filesystem Context 中的 legacy_parse_param 函数验证提供的参数长度的方式中发现了一个基于堆的缓冲区溢出缺陷。 非特权(在启用非特权用户命名空间的情况下,否则需要命名空间的 CAP_SYS_ADMIN 特权)本地用户能够打开不支持文件系统上下文 API 的文件系统(因此回退到遗留处理)可以使用此缺陷
Readme
# Container running cve-2022-0185 crash POC
![seccomp or bust](https://user-images.githubusercontent.com/275966/151207659-56d63de4-0556-4d3a-9b57-0586d3880ac4.png)

This is a docker container that runs the [crash POC](crash.c) from
https://www.willsroot.io/2022/01/cve-2022-0185.html.

The container runs unprivileged as UID 65534. You can also use `docker run -u`
or set a security context with RunAsUser additionally, all should yield the same
result.

## Run it
**To be clear, if you're vulnerable that will crash your server!**

### Docker
`docker run docker.io/fish/cve-2022-0185-crash-poc`

You can also build it yourself:
```
docker build -t crashtest .
docker run crashtest
```

### Kubernetes
`kubectl apply -f pod.yaml`
File Snapshot

[4.0K] /data/pocs/9de84a989d06acfcc2d50514a96b802bafe4b91f ├── [ 829] crash.c ├── [ 267] Dockerfile ├── [ 186] pod.yaml └── [ 730] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.