# 内核: io_uring: 通过缓冲环mmap造成page use-after-free漏洞
## 概述
Linux内核中的io_uring功能存在内存泄漏漏洞。当用户通过IORING_REGISTER_PBUF_RING注册一个缓冲区环,使用mmap()映射它,然后释放它时,会发生该漏洞。
## 影响版本
未指定具体版本。
## 细节
漏洞发生在用户通过IORING_REGISTER_PBUF_RING注册缓冲区环,然后通过mmap()进行映射,最后释放它时。此过程中导致内存泄漏。
## 影响
此漏洞允许本地用户导致系统崩溃或可能提升其权限。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | LPE exploit for CVE-2024-0582 (io_uring) | https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582 | POC详情 |
| 2 | None | https://github.com/Forsaken0129/CVE-2024-0582 | POC详情 |
| 3 | None | https://github.com/FoxyProxys/CVE-2024-0582 | POC详情 |
| 4 | None | https://github.com/0ptyx/cve-2024-0582 | POC详情 |
| 5 | is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582) | https://github.com/geniuszlyy/CVE-2024-0582 | POC详情 |
| 6 | A data-only attack based on CVE-2024-0582 | https://github.com/101010zyl/CVE-2024-0582 | POC详情 |
| 7 | is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582) | https://github.com/geniuszly/CVE-2024-0582 | POC详情 |
| 8 | A data-only attack based on CVE-2024-0582 | https://github.com/101010zyl/CVE-2024-0582-dataonly | POC详情 |
| 9 | A data-only exploit for CVE-2024-0582 | https://github.com/kuzeyardabulut/CVE-2024-0582 | POC详情 |
| 10 | CVE-2024-0582 exploit | https://github.com/pwnmonk/io_uring-n-day | POC详情 |
暂无评论