mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-01 03:00:54 +00:00
31 lines
1.5 KiB
Markdown
31 lines
1.5 KiB
Markdown
![]() |
### [CVE-2022-2078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/delsploit/CVE-2022-2078
|
||
|
- https://github.com/kdn111/linux-kernel-exploitation
|
||
|
- https://github.com/khanhdn111/linux-kernel-exploitation
|
||
|
- https://github.com/khanhdz-06/linux-kernel-exploitation
|
||
|
- https://github.com/khanhdz191/linux-kernel-exploitation
|
||
|
- https://github.com/khanhhdz/linux-kernel-exploitation
|
||
|
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||
|
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||
|
- https://github.com/knd06/linux-kernel-exploitation
|
||
|
- https://github.com/ndk191/linux-kernel-exploitation
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/ssr-111/linux-kernel-exploitation
|
||
|
- https://github.com/xairy/linux-kernel-exploitation
|
||
|
|