Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0995 PoC — Linux kernel 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 缓冲区错误漏洞 (CVE-2022-0995)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,攻击者可以通过 watch_queue 触发 Linux 内核的内存损坏,以触发拒绝服务,并可能运行代码。
Description
CVE-2022-0995 exploit
Readme
# CVE-2022-0995
This is my exploit for `CVE-2022-0995`, an heap out-of-bounds write in the watch_queue Linux kernel component.  
It uses the same technique described in https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html.  

The exploit targets Ubuntu 21.10 with kernel `5.13.0-37`.  
The exploit is not `100%` reliable, you may need to run it a couple of times.  It may panic the kernel, but during my tests it happened rarely.  
```sh
make
./exploit
```

![](./poc.png)
File Snapshot

[4.0K] /data/pocs/d9c7b36c349f98714298c9d97dea945d68c20548 ├── [ 11K] exploit.c ├── [ 129] Makefile ├── [246K] poc.png ├── [ 501] README.md ├── [ 785] util.c └── [1.0K] util.h 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.