Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0185 PoC — Linux kernel 数字错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 数字错误漏洞 (CVE-2022-0185)
Description:A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
Description
CVE-2022-0185 exploit
File Snapshot

[4.0K] /data/pocs/fa36b55828511edcfd9c5fdca4e64512504b3c70 ├── [9.4M] bzImage ├── [ 232] Makefile ├── [4.0K] pipe │   ├── [ 15K] exp.c │   └── [ 65] xmake.lua ├── [4.9M] rootfs.cpio ├── [ 240] start.sh ├── [4.0K] suid │   ├── [ 164] suid-test.c │   └── [ 72] xmake.lua ├── [4.0K] userfaultfd │   ├── [ 12K] exp.c │   └── [ 104] xmake.lua └── [ 116] xmake.lua 3 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →