关联漏洞
介绍
# PoC for CVE-2024-0582
While learning about the iouring interface, I decided to create a PoC for [CVE-2024-0582](https://nvd.nist.gov/vuln/detail/CVE-2024-0582). All of this work is derived directly from the CVE information, the [patch](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d) and a few other write ups related to io uring -- particularly Chompie's write up of [CVE-2021-41073](https://chomp.ie/Blog+Posts/Put+an+io_uring+on+it+-+Exploiting+the+Linux+Kernel).
文件快照
[4.0K] /data/pocs/213bbf9b7c8ef0a3610efc2c5cfc2e4f64f9953b
├── [ 12M] bzImage
├── [ 234] Makefile
├── [ 543] README.md
├── [ 406] run_dbg.sh
└── [4.0K] work
├── [5.6K] exp.c
├── [4.0K] include
│ ├── [4.0K] liburing
│ │ ├── [2.4K] barrier.h
│ │ ├── [ 276] compat.h
│ │ ├── [ 18K] io_uring.h
│ │ └── [ 164] io_uring_version.h
│ └── [ 42K] liburing.h
├── [172K] liburing.a
└── [2.6K] test.c
3 directories, 12 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。