Files
CVEs-PoC/2021/CVE-2021-3715.md
T
2024-06-22 09:37:59 +00:00

36 lines
1.8 KiB
Markdown

### [CVE-2021-3715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715)
![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416&color=brighgreen)
### Description
A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
### POC
#### Reference
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Markakd/CVE-2022-2588
- https://github.com/Markakd/GREBE
- https://github.com/Markakd/kernel_exploit
- https://github.com/VoidCybersec/thatone
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/dom4570/CVE-2022-2588
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation