Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-0582 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2024-0582)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于存在内存泄漏问题,允许本地用户导致崩溃或提升权限。
Readme
# PoC for CVE-2024-0582

While learning about the iouring interface, I decided to create a PoC for [CVE-2024-0582](https://nvd.nist.gov/vuln/detail/CVE-2024-0582). All of this work is derived directly from the CVE information, the [patch](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d) and a few other write ups related to io uring -- particularly Chompie's write up of [CVE-2021-41073](https://chomp.ie/Blog+Posts/Put+an+io_uring+on+it+-+Exploiting+the+Linux+Kernel).

File Snapshot

[4.0K] /data/pocs/213bbf9b7c8ef0a3610efc2c5cfc2e4f64f9953b ├── [ 12M] bzImage ├── [ 234] Makefile ├── [ 543] README.md ├── [ 406] run_dbg.sh └── [4.0K] work ├── [5.6K] exp.c ├── [4.0K] include │   ├── [4.0K] liburing │   │   ├── [2.4K] barrier.h │   │   ├── [ 276] compat.h │   │   ├── [ 18K] io_uring.h │   │   └── [ 164] io_uring_version.h │   └── [ 42K] liburing.h ├── [172K] liburing.a └── [2.6K] test.c 3 directories, 12 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.