Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2016-5195 PoC — Linux kernel 竞争条件问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 竞争条件问题漏洞 (CVE-2016-5195)
Description:Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Description
这里保留着部分脏牛漏洞的利用代码
Readme
# CVE-2016-5195
这里保留着部分脏牛漏洞的利用代码
File Snapshot

[4.0K] /data/pocs/66a3924a0ab56b62f9711443bf664915306e2fd6 ├── [2.6K] dirtycow.c ├── [4.0K] dirtycow-vdso │   ├── [4.0K] dirtycow-vdso │   │   ├── [ 13K] 0xdeadbeef.c │   │   ├── [ 284] Makefile │   │   ├── [3.4K] payload.s │   │   ├── [1.2K] README.md │   │   └── [4.0K] tools │   │   ├── [ 557] dump_vdso.c │   │   ├── [ 351] dump_vdso_prologue.sh │   │   ├── [ 234] Makefile │   │   └── [ 508] test_payload.c │   ├── [ 77] docker-compose.yml │   ├── [ 304] Dockerfile │   ├── [ 468] README.md │   ├── [ 37] runnit.sh │   └── [3.7K] 脏牛漏洞dirtycow-vsdo利用代码函数注释.txt └── [ 65] README.md 3 directories, 15 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →