Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-32250 PoC — Linux kernel 资源管理错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 资源管理错误漏洞 (CVE-2022-32250)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 5.18.1版本及之前版本存在安全漏洞,该漏洞源于net/netfilter/nf_tables_api.c允许本地用户将权限升级为root用户,攻击者利用该漏洞可导致释放后重用。
Readme
# CVE-2022-32250-Linux-Kernel-LPE

## Demo Video

https://www.youtube.com/watch?v=YqmwA6fPjKE

## About
- CVE-2022-32250 allows a local user to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

## Reference
- [Linux Kerenel Exploit (CVE-2022-32250) with mqueue](https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/)

## Affected Version
- Linux, before commit 520778042ccca019f3ffa136dd0ca565c486cedd (26 May, 2022)
- Ubuntu <= 22.04 before security patch

## Test Environment & Running

### Test Environment
- Platform
    - Ubuntu 22.04 amd64
- Versions
    - Linux ubuntu 5.15.0-27-generic #28-Ubuntu SMP Thu Apr 14 04:55:28 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux

### Running
```
gcc exp.c -o exp -l mnl -l nftnl -w
./exp
```

## Warning
- This exploit corrupts Linux kernel slabs, which might cause kernel panic when attempting to acquire root privileges.

## Result
![exp.png](./exp.png)
File Snapshot

[4.0K] /data/pocs/e8654112862f79c978de35424a94c7cddf76d231 ├── [ 19K] exp.c ├── [384K] exp.png └── [ 963] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.