mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-05 10:17:57 +00:00
3.9 KiB
3.9 KiB
CVE-2022-25636
Description
net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.
POC
Reference
- http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
- https://github.com/Bonfee/CVE-2022-25636
- https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
- https://www.oracle.com/security-alerts/cpujul2022.html
Github
- https://github.com/0xMarcio/cve
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/B0nfee/CVE-2022-25636
- https://github.com/Bonfee/CVE-2022-25636
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/GhostTroops/TOP
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Meowmycks/OSCPprep-Cute
- https://github.com/Meowmycks/OSCPprep-Sar
- https://github.com/Meowmycks/OSCPprep-hackme1
- https://github.com/Metarget/metarget
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/SnailDev/github-hot-hub
- https://github.com/WhooAmii/POC_to_review
- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits
- https://github.com/boustrophedon/extrasafe
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/bsauce/kernel-security-learning
- https://github.com/carmilea/carmilea
- https://github.com/chenaotian/CVE-2022-25636
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/hancp2016/news
- https://github.com/hardenedvault/ved
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/jakescheetz/OWASP-JuiceShop
- https://github.com/jbmihoub/all-poc
- https://github.com/jpacg/awesome-stars
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lonnyzhang423/github-hot-hub
- https://github.com/manas3c/CVE-POC
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pipiscrew/timeline
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/trhacknon/Pocingit
- https://github.com/veritas501/CVE-2022-25636-PipeVersion
- https://github.com/veritas501/pipe-primitive
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yaobinwen/robin_on_rails
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
- https://github.com/zhaoolee/garss
- https://github.com/zzcentury/PublicExploitation