Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-13272 PoC — Linux kernel 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 权限许可和访问控制问题漏洞 (CVE-2019-13272)
Description:Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。 Linux kernel 5.1.17之前版本中存在安全漏洞,该漏洞源于kernel/ptrace.c文件的ptrace_link没有正确处理对凭证的记录。攻击者可利用该漏洞获取root访问权限。
Description
To check for vulnerability CVE-2019-13272
Readme
# ptrace-vuln
To check for vulnerability CVE-2019-13272
***


It is just a sample proof of concept generated by LLM and does not cover all cases.
The basic idea is if the system is not hardened and ptrace is not removed, the vulnerability should be considered applicable.


***


Steps to compile code and run it:
```
gcc poc.c -o test
chmod +x test
./test
```
***


Sample output:
```
<..SNIP..>
Syscall: 158
Syscall: 158
Syscall: 218
Syscall: 218
Syscall: 273
Syscall: 2
Syscall: 5
Syscall: 1
Hello, ptrace!
Syscall: 1
Syscall: 3
<..SNIP..>
```
***
&NewLine;


File Snapshot

[4.0K] /data/pocs/c520e43e76f0766c7ac4550a1ebb640cdbd60fe9 ├── [1.0K] LICENSE ├── [ 771] poc.c └── [ 595] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.