9d88b475c1
The README has been claiming "each module credits the original CVE
reporter and PoC author in its NOTICE.md" since v0.1.0, but only
copy_fail_family actually shipped one. Fixed.
modules/<name>/NOTICE.md (×19 new + 1 existing): per-module
research credit covering CVE ID, discoverer, original advisory
URL where public, upstream fix commit, IAMROOT's role.
iamroot.c: new --dump-offsets subcommand. Resolves kernel offsets
via the existing core/offsets.c four-source chain (env →
/proc/kallsyms → /boot/System.map → embedded table), then emits
a ready-to-paste C struct entry for kernel_table[]. Run once
as root on a target kernel build; upstream via PR. Eliminates
fabricating offsets — every shipped entry traces back to a
`iamroot --dump-offsets` invocation on a real kernel.
docs/OFFSETS.md: documents the --dump-offsets workflow.
CVES.md: notes the NOTICE.md convention + offset dump tool.
iamroot.c: bump IAMROOT_VERSION 0.3.0 → 0.3.1.
811 B
811 B
NOTICE — dirty_cow (CVE-2016-5195)
Vulnerability
CVE-2016-5195 — Copy-on-write race via /proc/self/mem + madvise
→ arbitrary file write into the page cache.
Research credit
Discovered by Phil Oester, October 2016. The bug had been latent in the kernel since ~2007.
Original advisory: https://dirtycow.ninja/
Upstream fix: mainline 4.9 (commit 19be0eaffa3a, Oct 2016).
IAMROOT role
Two-thread Phil-Oester-style race: writer thread via
/proc/self/mem vs. madvise(MADV_DONTNEED) thread. Targets the
/etc/passwd UID field flip + su for the root shell. Useful for
old systems coverage — RHEL 6/7 (3.10 baseline), Ubuntu 14.04
(3.13), Ubuntu 16.04 (4.4), embedded boxes, IoT.
Ships auditd watch on /proc/self/mem and a sigma rule for non-root
mem-open patterns.