POC详情: ae7c21ff367ecea5230e217816de070a6ad06e17

来源
关联漏洞
标题: Linux kernel 安全漏洞 (CVE-2022-2588)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel route4_change存在安全漏洞,该漏洞源于释放后重用,允许本地有特权的攻击者使系统崩溃,可能导致本地特权升级问题。
介绍
# CVE-2022-2588
Code adapted for one cpu, and with a vagrant file provided to boot up a vulnerable machine used for educational purposes.


To create a vulnerable machine, you need to have [Vagrant](https://www.vagrantup.com/) installed on your machine, then execute on the repository root:
   ```sh
   Vagrant up
   ```
Wait for installation and booting then :
   ```sh
   Vagrant ssh
   ```
 
Inside the Vm:
   ```sh
   cd CVE-2022-2588/ && gcc ./exploit.c -o exploit -lpthread 
   ./exploit
   ```
then:
   ```sh
   su ensimag
   password:  #ensimag
   #
   ```
The original exploit code : [here](https://github.com/Markakd/CVE-2022-2588)

To prevent the exploit try to uncomment the line 15 and 18 and restart the process.


文件快照

[4.0K] /data/pocs/ae7c21ff367ecea5230e217816de070a6ad06e17 ├── [ 261] CMakeLists.txt ├── [ 22K] exploit.c ├── [ 729] README.md └── [1.6K] Vagrantfile 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。