关联漏洞
标题:
Linux kernel 安全漏洞
(CVE-2022-0847)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于新管道缓冲区结构的“flag”变量在 Linux 内核中的 copy_page_to_iter_pipe 和 push_pipe 函数中缺乏正确初始化。非特权本地用户利用该漏洞可以提升权限至root。以下产品和版本受到影响:Linux Kernel 5.8-5.16.11、5.8-5.15.25、5.8-5.10.102。
描述
An eBPF detection program for CVE-2022-0847
介绍
# dirtypipe-ebpf_detection -- Dirtypipe detection tool
This program was made to detect Dirty Pipe exploitation attempts thanks to eBPF. It also monitors nonvulnerable kernels and docker containers.

:flight_departure: If you want more details on how it works please read the [blog](https://skyblue.team/posts/dirtypipe-ebpf-detection/) post ! :flight_arrival:
## How does it works?
**Default execution:**
```bash
sudo ./bin/dirtypipe_detection
```
**Debug mode:**
> Show libbpf logs on execution
```bash
sudo ./bin/dirtypipe_detection --debug
```
**Daemon mode:**
> Run program as daemon and send alerts over syslog
```bash
sudo ./bin/dirtypipe_detection --daemon
```
## How to build?
### Debian
```bash
sudo apt install git make pkg-config libelf-dev clang-11 libc6-dev-i386 bpftool -y
git clone https://github.com/airbus-cert/dirtypipe-ebpf_detection
cd ./dirtypipe-ebpf_detection/src/
make
```
### Ubuntu
```bash
sudo apt install git make pkg-config libelf-dev clang-11 libc6-dev-i386 linux-tools-common linux-tools-$(uname -r) -y
git clone https://github.com/airbus-cert/dirtypipe-ebpf_detection
cd ./dirtypipe-ebpf_detection/src/
make
```
## Credits and References
Read the original [blog](https://dirtypipe.cm4all.com/) on Dirtypipe from max.kellermann@ionos.com
Read an interesting strategy from [Datadog](https://www.datadoghq.com/blog/dirty-pipe-vulnerability-overview-and-remediation/) team
文件快照
[4.0K] /data/pocs/d8d899c0e9b8bd1092f5df5e17fb11fe38f18940
├── [4.0K] libbpf
├── [9.9K] LICENSE
├── [1.4K] README.md
└── [4.0K] src
├── [4.0K] bin
├── [4.6K] dirtypipe_detection.bpf.c
├── [ 21K] dirtypipe_detection.c
├── [ 595] dirtypipe_detection_event.h
├── [2.6K] Makefile
└── [2.6M] vmlinux.h
3 directories, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。