Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-5195 PoC — Linux kernel 竞争条件问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 竞争条件问题漏洞 (CVE-2016-5195)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 2.x至4.8.3之前的4.x版本中的mm/gup.c文件存在竞争条件问题漏洞,该漏洞源于程序没有正确处理copy-on-write(COW)功能写入只读内存映射。本地攻击者可利用该漏洞获取权限。
Description
CVE-2016-5195 exploit written in Crystal
Readme
# dirtycow 

[![Build Status](https://travis-ci.org/xlucas/dirtycow.cr.svg?branch=master)](https://travis-ci.org/xlucas/dirtycow.cr)
[![Github All Releases](https://img.shields.io/github/downloads/xlucas/dirtycow.cr/total.svg)](https://github.com/xlucas/dirtycow.cr/releases)

CVE-2016-5195 exploit


## Installation

Go to the [release section](https://github.com/xlucas/dirtycow.cr/releases) or use your crystal environment.

## Usage

```bash
dirtycow --target /path/to/root/file --string "string to write" --offset <offset_in_file>
```
File Snapshot

[4.0K] /data/pocs/e3a1a5a149f8d462312694a5882f2b0a900faa99 ├── [1.1K] LICENSE ├── [ 540] README.md ├── [ 99] shard.yml └── [4.0K] src └── [1.1K] dirtycow.cr 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.