Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0995 PoC — Linux kernel 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 缓冲区错误漏洞 (CVE-2022-0995)
Description:An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.
Description
CVE-2022-0995 exploit
Readme
# CVE-2022-0995
CVE-2022-0995 exploit

+ **[writeups](https://1nzag.github.io/study/linux_kernel/case_study/cve_2022_0995)**

+ **exploit target**:
    linux-5.13.18

+ **refernces**:
    + <https://docs.kernel.org/core-api/watch_queue.html#overview>>
    + <https://bsauce.github.io/2022/04/15/CVE-2022-0995/>
    + <https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html>
    + <https://github.com/Bonfee/CVE-2022-0995>


## How to build

```bash
gcc -o exploit exploit.c
```
File Snapshot

[4.0K] /data/pocs/940acac03c0681d639afaed2b50699c673fdd729 ├── [ 17K] exploit.c └── [ 504] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →