关联漏洞
标题:
Linux kernel 安全漏洞
(CVE-2022-2602)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 5.10.149-1之前版本存在安全漏洞,该漏洞源于发现处理io_uring请求和Unix套接字垃圾收集器之间的竞争,攻击者可以利用此漏洞进行本地权限提升。
介绍
# CVE-2022-2602-Kernel-Exploit
## Details
https://blog.hacktivesecurity.com/index.php/2022/12/21/cve-2022-2602-dirtycred-file-exploitation-applied-on-an-io_uring-uaf/
## TL;DR
The vulnerability is an Use-After-Free that impacts the registered file descriptor functionality in the io_uring subsystem. It's possible to register a file in the io_uring context, free it from the Unix Garbage Collector and re-use it with the requested io_uring operation (for example, a `writev` operation). To exploit the bug, it was a matter of replace the freed file structure with a read-only file (e.g. /etc/passwd), in order to write into it, and achieve a good timing with a small race window.
文件快照
[4.0K] /data/pocs/d4a99974ba340da8730501b0810704e84bc1ce59
├── [5.7K] exploit.c
└── [ 682] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。