cve/2022/CVE-2022-1016.md

34 lines
1.7 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016)
![](https://img.shields.io/static/v1?label=Product&message=Kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Affects%20v3.13-rc1%20and%20later%2C%20Fixed%20in%20v5.18-rc1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-824%20-%20Access%20of%20Uninitialized%20Pointer.&color=brighgreen)
### Description
A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.
### POC
#### Reference
- http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
2024-08-11 18:44:53 +00:00
- https://github.com/ndk06/linux-kernel-exploitation
2024-05-25 21:48:12 +02:00
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
2024-06-10 07:22:43 +00:00
- https://github.com/wechicken456/Linux-kernel
2024-06-22 09:37:59 +00:00
- https://github.com/wkhnh06/linux-kernel-exploitation
2024-05-25 21:48:12 +02:00
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/yaobinwen/robin_on_rails
- https://github.com/zanezhub/CVE-2022-1015-1016