Skip to content

Conversation

@blincoln-bf
Copy link

The exploit code for CVE-2022-2585 shared by SSD Secure Disclosure was corrupted (on their original page at https://ssd-disclosure.com/ssd-advisory-linux-clock_thread_cputime_id-lpe/):

  • \n newline characters in C strings had been converted to the letter n. This broke at least one key function, and also caused console output to be formatted poorly.
  • If a file began with a # (e.g. # define), that first pound sign was stripped, which prevented compilation because it broke two #define statements.

The version in this repo was also missing the customized libexp.c included in the SSD Secure Disclosure post. That file is necessary because it contains quite a few functions referred to in exploit.c.

Finally, I added instructions for compiling the exploit, because it's not just make or gcc -o exploit exploit.c in this case.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant