Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3864 PoC — Linux kernel 访问控制错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 访问控制错误漏洞 (CVE-2021-3864)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于当某些 SUID 二进制文件执行其后代时,在处理可转储标志设置的方式中发现了一个缺陷。先决条件是 SUID 二进制文件,它将实际 UID 设置为有效 UID,将实际 GID 设置为等于有效 GID。然后,子体的可转储值将设置为 1。因此,如果后代进程崩溃,并且core_pattern设置为相对值,则其核心转储将存储在具有 uid:gid 权限的当前目录中。具有符合条件的根
Description
Test for cve-2021-3864
Readme
Test for [CVE-2021-3864](https://access.redhat.com/security/cve/CVE-2021-3864).

How to run
----------

* create a user
* `echo <username> ALL= path/to/gen-core >> /etc/sudoers`
* `sysctl kernel.core_pattern=core`
* ./cve-2021-3864
* It should generate a core file in /etc/logrotate.d
File Snapshot

[4.0K] /data/pocs/c52cb8fe9293585ddfb1c5bcda5cf503da99683d ├── [1.3K] cve-2021-3864.c ├── [ 94] gen-core.c ├── [ 272] Makefile └── [ 285] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.