diff --git a/cve/linux-kernel/2022/yaml/CVE-2022-2639.yaml b/cve/linux-kernel/2022/yaml/CVE-2022-2639.yaml new file mode 100644 index 0000000000000000000000000000000000000000..01b0e4d713b79d49e04046b7c03baa6b0286ba5f --- /dev/null +++ b/cve/linux-kernel/2022/yaml/CVE-2022-2639.yaml @@ -0,0 +1,48 @@ +FormatVer: 20220411 +Id: CVE-2022-2639 +Belong: kernel +PocHazardLevel: low +Source: https://github.com/avboy1337/CVE-2022-2639-PipeVersion +SiteInfo: + Name: Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核 + Severity: high + Description: + 由于 openvswitch模块中reserve_sfa_size()函数在使用过程中存在缺陷,导致本地经过身份认证的攻击者可以利用漏洞提升至root权限 + ScopeOfInfluence: + kernel(>=3.13 && <5.18) + References: + - https://nvd.nist.gov/vuln/detail/CVE-2022-2639 + - https://github.com/torvalds/linux/commit/cefa91b2332d7009bc0be5d951d6cbbf349f90f8 + SiteClassification: + CvssMetrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + CvssScore: 7.8 + CveId: CVE-2022-2639 + CweId: None + CnvdId: None + KveId: None + Tags: + - ve2022 + - 权限提升 +SiteRequests: + Implement: + ImArray: + - Exec : "CVE-2022-2639_x86_64" + Args : + ExpireTime: 30 #second + + # < input + # > output + # . wait + # ? condition + # : content + # + #组合起来 + # >. 等待直到输出 + # << 输入字符 + # >?判断条件 + Inter: + - ">.:infinitely ..." #等待输出'infinitely ...' + - "<<:id\n" #输入'id\n' + - ">.:\n" #等待输出'\n' + - ">?:uid=0(root)" #判断输出为'uid=0(root)'为成功 + Condition: None