关联漏洞
描述
CVE-2022-0995 exploit
介绍
# CVE-2022-0995
This is my exploit for `CVE-2022-0995`, an heap out-of-bounds write in the watch_queue Linux kernel component.
It uses the same technique described in https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html.
The exploit targets Ubuntu 21.10 with kernel `5.13.0-37`.
The exploit is not `100%` reliable, you may need to run it a couple of times. It may panic the kernel, but during my tests it happened rarely.
```sh
make
./exploit
```

文件快照
[4.0K] /data/pocs/d9c7b36c349f98714298c9d97dea945d68c20548
├── [ 11K] exploit.c
├── [ 129] Makefile
├── [246K] poc.png
├── [ 501] README.md
├── [ 785] util.c
└── [1.0K] util.h
0 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。