Using Dirty Pagetable technology to reproduce CVE-2020-29661# CVE-2020-29661
结合[Dirty Pagetable: A Novel Exploitation Technique To Rule Linux Kernel](https://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html)文章使用`Dirty Pagetable`方法
对`pid-uaf`漏洞复现
- CVE-2020-29661.md:漏洞复现报告
- backdoor:触发error后需要被`root`执行的文件
- boot.sh:启动脚本
- bzImage-5_6:内核镜像
- compose.sh:打包脚本
- config:内核编译config
- error:需要被执行的非法文件
- myexp.c:exp脚本
- rootfs.cpio:文件系统
[4.0K] /data/pocs/1b2e9a42595ffc71953cd44c3b2aed21dfc0bd02
├── [ 125] backdoor
├── [ 333] boot.sh
├── [8.6M] bzImage-5_6
├── [ 207] compose.sh
├── [122K] config
├── [ 39K] CVE-2020-29661.md
├── [ 5] error
├── [4.0K] img
│ ├── [ 1] 1
│ ├── [ 57K] 2.png
│ └── [1.3M] 3.png
├── [ 18K] myexp.c
├── [ 530] README.md
└── [ 22M] rootfs.cpio
1 directory, 13 files