POC详情: d4a99974ba340da8730501b0810704e84bc1ce59

来源
关联漏洞
标题: Linux kernel 安全漏洞 (CVE-2022-2602)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 5.10.149-1之前版本存在安全漏洞,该漏洞源于发现处理io_uring请求和Unix套接字垃圾收集器之间的竞争,攻击者可以利用此漏洞进行本地权限提升。
介绍
# CVE-2022-2602-Kernel-Exploit
## Details
https://blog.hacktivesecurity.com/index.php/2022/12/21/cve-2022-2602-dirtycred-file-exploitation-applied-on-an-io_uring-uaf/


## TL;DR
The vulnerability is an Use-After-Free that impacts the registered file descriptor functionality in the io_uring subsystem. It's possible to register a file in the io_uring context, free it from the Unix Garbage Collector and re-use it with the requested io_uring operation (for example, a `writev` operation). To exploit the bug, it was a matter of replace the freed file structure with a read-only file (e.g. /etc/passwd), in order to write into it, and achieve a good timing with a small race window.
文件快照

[4.0K] /data/pocs/d4a99974ba340da8730501b0810704e84bc1ce59 ├── [5.7K] exploit.c └── [ 682] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。