Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-33909 PoC — Linux kernel 输入验证错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 输入验证错误漏洞 (CVE-2021-33909)
Description:fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
Description
This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime
Readme
Kernel runtime fix of CVE-2021-33909
====================================

This repository builds an out-of-tree module named "cve-2021-33909.ko".
cve-2021-33909 fixes an issue in the kernels filesystem layer by kprobe-replacing vulnerable functions during runtime.

It can be build via "make", setting KDIR to the kernels (source-/header-)directory.

It can be loaded directly via "insmod cve-2021-33909.ko",
or copied (+depmod) into the kernels module directory (extra/) and then modprobed with "modprobe cve-2021-33909".

by Stephan Baerwolf, Erfurt 2021
File Snapshot

[4.0K] /data/pocs/2f600699eb6760c14eb9701cefa77bdc2155017d ├── [3.9K] cve-2021-33909_core.c ├── [5.9K] cve-2021-33909_seq_file.c ├── [ 270] Makefile └── [ 558] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →