mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
21 lines
860 B
Markdown
21 lines
860 B
Markdown
![]() |
### [CVE-2022-1011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011)
|
|||
|

|
|||
|

|
|||
|

|
|||
|
|
|||
|
### Description
|
|||
|
|
|||
|
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
|
|||
|
|
|||
|
### POC
|
|||
|
|
|||
|
#### Reference
|
|||
|
- https://www.oracle.com/security-alerts/cpujul2022.html
|
|||
|
|
|||
|
#### Github
|
|||
|
- https://github.com/ARPSyndicate/cvemon
|
|||
|
- https://github.com/PazDak/feathers-macos-detections
|
|||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|||
|
- https://github.com/xkaneiki/CVE-2022-1011
|
|||
|
|