关联漏洞
标题:
Linux kernel 安全漏洞
(CVE-2022-0847)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于新管道缓冲区结构的“flag”变量在 Linux 内核中的 copy_page_to_iter_pipe 和 push_pipe 函数中缺乏正确初始化。非特权本地用户利用该漏洞可以提升权限至root。以下产品和版本受到影响:Linux Kernel 5.8-5.16.11、5.8-5.15.25、5.8-5.10.102。
描述
A Simple bash script that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11
介绍
# debian11-dirty_pipe-patcher
*This Project is still under development*
Since the Debian 11 still comes with the kernel version 5.10, which is vulnerable to the Dirty Pipe Vulnerability,
this scirpt is made for manually compile and install the kernel version 5.18 which is not vulnerable.
## Usage
1. Clone the repository
2. Run the bash script with sudo permissons
3. Reboot the system
## Notes
- Do not do configurations in the first make config
- Clear the cryptograpic key locations in the oldconfig
- Make the proper Kernel Hacks and Drivere configurations in the make config screen
## Special Credits
- https://youtu.be/gfqeyxP4wWY
文件快照
[4.0K] /data/pocs/3b9f4451cdfa95f165727e584cf346cc4e5cf7b6
├── [ 16K] LICENSE
├── [ 644] README.md
└── [1.0K] script.sh
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。