Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0847 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2022-0847)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于新管道缓冲区结构的“flag”变量在 Linux 内核中的 copy_page_to_iter_pipe 和 push_pipe 函数中缺乏正确初始化。非特权本地用户利用该漏洞可以提升权限至root。以下产品和版本受到影响:Linux Kernel 5.8-5.16.11、5.8-5.15.25、5.8-5.10.102。
Description
A Simple bash script that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11
Readme
# debian11-dirty_pipe-patcher

*This Project is still under development*

Since the Debian 11 still comes with the kernel version 5.10, which is vulnerable to the Dirty Pipe Vulnerability,
this scirpt is made for manually compile and install the kernel version 5.18 which is not vulnerable.

## Usage
1. Clone the repository
2. Run the bash script with sudo permissons 
3. Reboot the system

## Notes
- Do not do configurations in the first make config
- Clear the cryptograpic key locations in the oldconfig
- Make the proper Kernel Hacks and Drivere configurations in the make config screen

## Special Credits
- https://youtu.be/gfqeyxP4wWY
File Snapshot

[4.0K] /data/pocs/3b9f4451cdfa95f165727e584cf346cc4e5cf7b6 ├── [ 16K] LICENSE ├── [ 644] README.md └── [1.0K] script.sh 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.