Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Bonfee/CVE-2022-0995
CVE-2022-0995 exploit
https://github.com/Bonfee/CVE-2022-0995
Last synced: 21 days ago
JSON representation
CVE-2022-0995 exploit
- Host: GitHub
- URL: https://github.com/Bonfee/CVE-2022-0995
- Owner: Bonfee
- Created: 2022-03-26T21:46:09.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-03-27T09:07:01.000Z (over 2 years ago)
- Last Synced: 2024-08-05T17:24:56.092Z (4 months ago)
- Language: C
- Size: 241 KB
- Stars: 495
- Watchers: 8
- Forks: 70
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - Bonfee/CVE-2022-0995 - CVE-2022-0995 exploit (C)
README
# CVE-2022-0995
This is my exploit for `CVE-2022-0995`, an heap out-of-bounds write in the watch_queue Linux kernel component.
It uses the same technique described in https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html.The exploit targets Ubuntu 21.10 with kernel `5.13.0-37`.
The exploit is not `100%` reliable, you may need to run it a couple of times. It may panic the kernel, but during my tests it happened rarely.
```sh
make
./exploit
```![](./poc.png)