openkylin-exploit-db/cve/linux-kernel/2022/CVE-2022-0995
yangjipeng 0023613414 ADD CVE-2022-0995 2022-10-25 07:23:41 +00:00
..
Makefile ADD CVE-2022-0995 2022-10-25 07:23:41 +00:00
README.md ADD CVE-2022-0995 2022-10-25 07:23:41 +00:00
exploit.c ADD CVE-2022-0995 2022-10-25 07:23:41 +00:00
poc.png ADD CVE-2022-0995 2022-10-25 07:23:41 +00:00
util.c ADD CVE-2022-0995 2022-10-25 07:23:41 +00:00
util.h ADD CVE-2022-0995 2022-10-25 07:23:41 +00:00

README.md

CVE-2022-0995

This is my exploit for CVE-2022-0995, an heap out-of-bounds write in the watch_queue Linux kernel component.
It uses the same technique described in https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html.

The exploit targets Ubuntu 21.10 with kernel 5.13.0-37.
The exploit is not 100% reliable, you may need to run it a couple of times. It may panic the kernel, but during my tests it happened rarely.

make
./exploit