Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0185 PoC — Linux kernel 数字错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 数字错误漏洞 (CVE-2022-0185)
Description:A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
Readme
# Container running cve-2022-0185 crash POC
![seccomp or bust](https://user-images.githubusercontent.com/275966/151207659-56d63de4-0556-4d3a-9b57-0586d3880ac4.png)

This is a docker container that runs the [crash POC](crash.c) from
https://www.willsroot.io/2022/01/cve-2022-0185.html.

The container runs unprivileged as UID 65534. You can also use `docker run -u`
or set a security context with RunAsUser additionally, all should yield the same
result.

## Run it
**To be clear, if you're vulnerable that will crash your server!**

### Docker
`docker run docker.io/fish/cve-2022-0185-crash-poc`

You can also build it yourself:
```
docker build -t crashtest .
docker run crashtest
```

### Kubernetes
`kubectl apply -f pod.yaml`
File Snapshot

[4.0K] /data/pocs/9de84a989d06acfcc2d50514a96b802bafe4b91f ├── [ 829] crash.c ├── [ 267] Dockerfile ├── [ 186] pod.yaml └── [ 730] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →