### [CVE-2015-1328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1328) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace. ### POC #### Reference - https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html - https://www.exploit-db.com/exploits/37292/ #### Github - https://github.com/0x1ns4n3/CVE-2015-1328-GoldenEye - https://github.com/ARPSyndicate/cvemon - https://github.com/AfvanMoopen/tryhackme- - https://github.com/Al1ex/LinuxEelvation - https://github.com/C0dak/linux-kernel-exploits - https://github.com/C0dak/local-root-exploit- - https://github.com/DarkenCode/PoC - https://github.com/De4dCr0w/Linux-kernel-EoP-exp - https://github.com/Feng4/linux-kernel-exploits - https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/Micr067/linux-kernel-exploits - https://github.com/QChiLan/linux-exp - https://github.com/QuantumPhysx2/CVE-Cheat-Sheet - https://github.com/R0B1NL1N/Linux-Kernal-Exploits-m- - https://github.com/R0B1NL1N/Linux-Kernel-Exploites - https://github.com/SR7-HACKING/LINUX-VULNERABILITY-CVE-2015-1328 - https://github.com/SecWiki/linux-kernel-exploits - https://github.com/SexyBeast233/SecBooks - https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowven/Vulnerability_Reproduction - https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/ZTK-009/linux-kernel-exploits - https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits - https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits - https://github.com/amtzespinosa/tr0ll-walkthrough - https://github.com/anoaghost/Localroot_Compile - https://github.com/catsecorg/CatSec-TryHackMe-WriteUps - https://github.com/coffee727/linux-exp - https://github.com/copperfieldd/linux-kernel-exploits - https://github.com/distance-vector/linux-kernel-exploits - https://github.com/fei9747/LinuxEelvation - https://github.com/ferovap/Tools - https://github.com/freelancermijan/Linux-Privilege-Escalation-Tryhackme - https://github.com/h4x0r-dz/local-root-exploit- - https://github.com/hktalent/bug-bounty - https://github.com/j-info/ctfsite - https://github.com/kerk1/ShellShock-Scenario - https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups - https://github.com/kumardineshwar/linux-kernel-exploits - https://github.com/m0mkris/linux-kernel-exploits - https://github.com/makoto56/penetration-suite-toolkit - https://github.com/notlikethis/CVE-2015-1328 - https://github.com/ozkanbilge/Linux-Kernel-Exploits - https://github.com/p00h00/linux-exploits - https://github.com/password520/linux-kernel-exploits - https://github.com/pnasis/exploits - https://github.com/qiantu88/Linux--exp - https://github.com/rakjong/LinuxElevation - https://github.com/redteam-project/cyber-range-scenarios - https://github.com/saleem024/sample - https://github.com/santosfabin/hack-Linux-Privilege-Escalation - https://github.com/spencerdodd/kernelpop - https://github.com/testermas/tryhackme - https://github.com/uoanlab/vultest - https://github.com/xfinest/linux-kernel-exploits - https://github.com/xssfile/linux-kernel-exploits - https://github.com/xyongcn/exploit - https://github.com/yige666/linux-kernel-exploits - https://github.com/zyjsuper/linux-kernel-exploits