Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42327 PoC — Linux kernel 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 缓冲区错误漏洞 (CVE-2021-42327)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 5.14.14之前版本存在安全漏洞,该漏洞源于内核中drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c文件的dp_link_settings_write中存在基于堆的缓冲区溢出,攻击者可利用该漏洞可以写一个字符串到AMD GPU显示驱动调试文件系统。在parse_write_buffer_into_params函数中,当它使用从用户
Description
 kernel exploit POC for vulnerability i found in amd gpu driver
Readme
# CVE-2021-42327

SLUB overflow exploit


[full writeup](https://docfate111.github.io/blog/securityresearch/2021/11/08/SLUBoverflow.html) 
File Snapshot

[4.0K] /data/pocs/ef8ecc7f08c7ee89634e082322cc8aa19a00ee55 ├── [5.2K] exploit.c ├── [ 12K] exploit_userfaultfd.c ├── [ 173] gdbscript ├── [4.0K] module │   ├── [5.4K] cdev.c │   ├── [299K] cdev.ko │   └── [ 255] Makefile ├── [ 139] README.md ├── [ 540] run_challenge.sh └── [ 192] setup.sh 1 directory, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.