关联漏洞
标题:
Linux kernel 竞争条件问题漏洞
(CVE-2016-5195)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 2.x至4.8.3之前的4.x版本中的mm/gup.c文件存在竞争条件问题漏洞,该漏洞源于程序没有正确处理copy-on-write(COW)功能写入只读内存映射。本地攻击者可利用该漏洞获取权限。
描述
Mitigates CVE-2016-5195 aka DirtyCOW
介绍
# Ansible Role: CVE
[](https://galaxy.ansible.com/pgporada/cve/)
[](LICENSE)
This role mitigates/patches the defined CVEs.
- - - -
# Role Variables
Dirty COW vuln. http://dirtycow.ninja. Defaults to false. This mitigation will need to be run everytime the server it has been applied on restarts.
cve_2016_5195: false
- - - -
# Example Playbook
```
---
- hosts: localhost
connection: local
become: true
become_method: sudo
vars:
cve_2016_5195: true
roles:
- ../ansible-role-cve
```
- - - -
# How to hack away at this role
Before submitting a PR, please create a test and run it through test-kitchen.
```
git clone git@github.com:pgporada/ansible-role-cve.git
bundle install
bundle exec kitchen create
bundle exec kitchen converge
bundle exec kitchen verify
bundle exec kitchen destroy
```
- - - -
# Author Information
Phil Porada
- - - -
# License
MIT
(c) 2016 GreenLancer.com
文件快照
[4.0K] /data/pocs/99226c72edd53ae9278f708472a6001d63bc8c87
├── [2.2K] bumpver.sh
├── [ 859] CHANGES
├── [4.0K] defaults
│ └── [ 25] main.yml
├── [4.0K] files
│ └── [4.0K] CVE-2016-5195
│ └── [ 275] CVE-2016-5195.stap
├── [ 112] Gemfile
├── [1.1K] LICENSE
├── [4.0K] meta
│ └── [ 352] main.yml
├── [ 141] playbook.yml
├── [1.0K] README.md
├── [4.0K] tasks
│ ├── [1.5K] CVE-2016-5195.yml
│ └── [ 260] main.yml
├── [4.0K] test
│ └── [4.0K] integration
│ └── [4.0K] default
│ ├── [4.0K] bats
│ │ └── [ 280] 99_idempotence.bats
│ └── [ 92] default.yml
└── [ 6] VERSION
9 directories, 14 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。