[
  {
    "path": "Dockerfile",
    "content": "FROM ubuntu:14.04\n\nRUN apt-get update\nRUN apt-get install -y build-essential\nRUN apt-get install -y nasm\nRUN apt-get install -y git\nRUN mkdir /dirtycow-vdso\nRUN git clone https://github.com/scumjr/dirtycow-vdso.git /dirtycow-vdso\nADD runnit.sh /\nRUN chmod 755 /runnit.sh\n\nEXPOSE 1234\n\nCMD [\"/runnit.sh\"]\n"
  },
  {
    "path": "README.md",
    "content": "# dirtycow-docker-vdso\n\nThis repository is the necessary bits to get the vdso based Dirty Cow POC working inside a docker container. All the really exciting stuff was done by Scumjr, see his POC repo over at https://github.com/scumjr/dirtycow-vdso.\n\nThere is also a writeup and youtube video of using the above exploit to break out of a docker container on my blog:\n\n  https://blog.paranoidsoftware.com/dirty-cow-cve-2016-5195-docker-container-escape/\n  \n  \n  cheers!\n"
  },
  {
    "path": "docker-compose.yml",
    "content": "version: '2'\nservices:\n  dirtycow:\n    build: .\n    restart: unless-stopped\n\n"
  },
  {
    "path": "runnit.sh",
    "content": "#!/bin/bash\n\ncd /dirtycow-vdso\nmake\n\n"
  }
]