mirror of https://gitee.com/openkylin/genmai.git
update data/KernelPocs/CVE-2023-0179/README.md.
Signed-off-by: Cage <wangjiaming2022@buaa.edu.cn>
This commit is contained in:
parent
117fbe8780
commit
736cbe5297
|
@ -28,9 +28,3 @@ The exploit creates a new user account `needle:needle` with UID 0 by abusing the
|
|||
|
||||
Enjoy root privileges.
|
||||
|
||||
## Demo
|
||||
|
||||
[![asciicast](https://asciinema.org/a/mVTu420tWy8ocdFY70sWD9VLO.svg)](https://asciinema.org/a/mVTu420tWy8ocdFY70sWD9VLO)
|
||||
|
||||
## Credits
|
||||
- David Bouman's `libnftnl` [implementation](https://github.com/pqlx/CVE-2022-1015) and detailed [blog post](https://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/)
|
||||
|
|
Loading…
Reference in New Issue