6a0a7d8718
Pre-scaffolding for the next batch (CVE-2023-32233, CVE-2023-4622, CVE-2022-25636, CVE-2023-0179). Each module ships as a 21-line stub returning PRECOND_FAIL; parallel agents fill in the real detect/exploit/--full-chain implementations. This commit keeps registry.h / iamroot.c / Makefile in one place so the 4 parallel agents don't collide on shared-file edits — they each own a single iamroot_modules.c. Build clean on Debian 6.12.86; --list shows all 24 modules including the 4 new stubs.
24 lines
831 B
C
24 lines
831 B
C
/* nft_set_uaf_cve_2023_32233 — STUB pending agent implementation. */
|
|
#include "iamroot_modules.h"
|
|
#include "../../core/registry.h"
|
|
|
|
static iamroot_result_t nft_set_uaf_detect(const struct iamroot_ctx *ctx)
|
|
{
|
|
(void)ctx;
|
|
return IAMROOT_PRECOND_FAIL;
|
|
}
|
|
|
|
const struct iamroot_module nft_set_uaf_module = {
|
|
.name = "nft_set_uaf",
|
|
.cve = "CVE-2023-32233",
|
|
.summary = "nf_tables anonymous-set UAF (Sondej+Krysiuk) — stub pending implementation",
|
|
.family = "nf_tables",
|
|
.kernel_range = "5.1 ≤ K < 6.4; backports to LTS pending",
|
|
.detect = nft_set_uaf_detect,
|
|
.exploit = NULL, .mitigate = NULL, .cleanup = NULL,
|
|
.detect_auditd = NULL, .detect_sigma = NULL,
|
|
.detect_yara = NULL, .detect_falco = NULL,
|
|
};
|
|
|
|
void iamroot_register_nft_set_uaf(void) { iamroot_register(&nft_set_uaf_module); }
|