Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22555 PoC — Linux kernel 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 缓冲区错误漏洞 (CVE-2021-22555)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在缓冲区错误漏洞,该漏洞源于net/netfilter/x_tables.c 中的堆越界写入。该漏洞允许攻击者通过用户名空间获得权限或引起 DoS。
Description
This repo hosts TUKRU's Linux Privilege Escalation exploit (CVE-2021-22555). It demonstrates gaining root privileges via a vulnerability. Tested on Ubuntu 5.8.0-48-generic and COS 5.4.89+. Use responsibly and ethically.
Readme
# CVE-2021-22555
This repo hosts TUKRU's Linux Privilege Escalation exploit (CVE-2021-22555). It demonstrates gaining root privileges via a vulnerability. Tested on Ubuntu 5.8.0-48-generic and COS 5.4.89+. Use responsibly and ethically.
CVE-2021-22555: Linux Privilege Escalation Exploit

![GitHub](https://img.shields.io/github/license/tukru/CVE-2021-22555)
![GitHub top language](https://img.shields.io/github/languages/top/tukru/CVE-2021-22555)
![GitHub last commit](https://img.shields.io/github/last-commit/tukru/CVE-2021-22555)

This repository contains a Linux Privilege Escalation exploit for the CVE-2021-22555 vulnerability. The exploit leverages a vulnerability in the Linux kernel to escalate privileges.

## Disclaimer

This code is for educational and ethical testing purposes only. Misuse of this software can lead to criminal charges. The authors and contributors are not responsible for any damages caused by the misuse of this software.

## Prerequisites

- Linux system with a vulnerable kernel
- Basic knowledge of C and Linux system programming

## Installation

1. Clone the repository:

git clone https://github.com/tukru/CVE-2021-22555.git


2. Navigate to the repository:

cd CVE-2021-22555


3. Compile the code:

gcc -o exploit exploit.c


## Usage

Run the compiled binary with necessary privileges:

./exploit



## Contributing

Contributions are welcome. Please open an issue or submit a pull request.
File Snapshot

[4.0K] /data/pocs/a4926fc8d761582ccd64f8180f4f201b90496694 ├── [ 22K] exploit.c ├── [ 34K] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.