CVE-2022-2588
CVE-2022-2588 copied to clipboard
exploit for CVE-2022-2588
Hi, I am testing this poc on ARM .But exploit was unable to find overlap id . so that changes are required to make it run on ARM(pi)
Tested the exploit on different kernels of Gentoo but it crash everytime. 5.6.7-gentoo 4.9.87-gentoo
[158] ~/.cache/py3.wma $ ./root self path /home/info/kmatsu/.cache/py3.wma/./root prepare done Old limits -> soft limit= 14096 hard limit= 14096 starting exploit, num of cores: 16 defrag done spray 256 done freed...
I get to compile the exploit with make but then i got the following: ```bash prepare done unshare (CLONE_NEWUSER): Operation not permitted unshare (CLONE_NEWUSER): Operation not permitted defrag done ```...
Hello, are you going to release the attack against cred? Actually I wonder how you can leverage the high privilege cred object after freeing the victim object, as different victim...
test@test-ThinkCentre-M92p:~/Desktop/kernel-exploit-factory/CVE-2022-2588$ ./exploit [*] self path /home/test/Desktop/kernel-exploit-factory/CVE-2022-2588/./exploit [*] prepare evil data Old limits -> soft limit= 14096 hard limit= 14096 [*] starting exploit, num of cores: 4 [1] defragmentation - spray...