-
Notifications
You must be signed in to change notification settings - Fork 411
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kernelCTF: add CVE-2023-0461_mitigation #31
Conversation
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
Hey! Sorry for the late response. We created a Github Actions job to verify the submission PRs. You can view the result of the check here: https://github.com/google/security-research/actions/runs/5962545386 It failed with two issues:
Feel free to modify the PR and the Github Action will run again and you will see the new verification results. Thank you for your submission and participating in kernelCTF! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added JSON schema changes as suggestions and a Makefile change which will fix the build process.
pocs/linux/kernelctf/CVE-2023-0461_mitigation/exploit/mitigation-6.1/Makefile
Show resolved
Hide resolved
Co-authored-by: Tamás Koczka <[email protected]>
Co-authored-by: Tamás Koczka <[email protected]>
Co-authored-by: Tamás Koczka <[email protected]>
…on-6.1/Makefile Co-authored-by: Tamás Koczka <[email protected]>
Hey! Looking at logs, nine times out of ten the rop-chain worked, but the exploit segfaulted after returning to user space.
It turned out that it was crashing at the beginning of the
Initializing the stack memory before hijacking control flow solved the problem (tested locally using the I updated the exploit source code, please let me know if I need to update the exploit binary as well. |
No description provided.