Skip to content

Ruia-ruia/CVE-2022-29582-Exploit

main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
bin
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

CVE-2022-29582

This repository contains exploit code for CVE-2022-29582, a Local Privilege Escalation in io_uring (of the Linux kernel).

Default configurations are affected and no special privileges should be needed.

You can find the writeup at https://ruia-ruia.github.io/2022/08/05/CVE-2022-29582-io-uring/

Building

Running

make

should result in a shiny new executable - or just use the pre-commited one :)

Testing

First, check the writeup for the (micro)arch specs. Then run the given kernel: vmlinuz-5.10.90. The exploit (particularly now the ROP chain) should work fine with the kCTF setup.

About

Exploit for CVE-2022-29582 targeting Google's Kernel CTF

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •