Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0185 PoC — Linux kernel 数字错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 数字错误漏洞 (CVE-2022-0185)
Description:A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
Description
CVE-2022-0185 exploit rewritten with pipe primitive
Readme
# CVE-2022-0185 pipe version

Using pipe-primitive  to exploit CVE-2022-0185, so no kaslr leak nor smap smep ktpi bypass is needed :)

(Q: What is pipe-primitive? A: https://github.com/veritas501/pipe-primitive)

![](assets/it_works.png)
File Snapshot

[4.0K] /data/pocs/5bfcc28acf0b91baca3920ea5faa3d2257023a16 ├── [4.0K] assets │   └── [ 24K] it_works.png ├── [ 23K] exploit.c ├── [ 60] Makefile └── [ 245] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →