关联漏洞
描述
A PoC for CVE-2022-2588 that triggers a WARNING
介绍
# CVE-2022-2588 - Linux kernel cls_route UAF
It was discovered that the cls_route filter implementation in the Linux kernel
would not remove an old filter from the hashtable before freeing it if its
handle had the value 0.
Zhenpeng Lin working with Trend Micro's Zero Day Initiative discovered that
this vulnerability could be exploited for Local Privilege Escalation. This has
been reported as ZDI-CAN-17440, and assigned CVE-2022-2588.
This bug has been present since the first Linux commit git, v2.6.12-rc2.
Exploiting it requires CAP_NET_ADMIN in any user or network namespace.
It can be mitigated by those users who do not rely on cls_route, by adding
'install cls_route /bin/true' to their modprobe.conf or modprobe.d configs,
in case it's built as a module.
This PoC triggers a WARNING
文件快照
[4.0K] /data/pocs/1cea4791f57d16d1c871b1e6d6ca834c3046bd17
├── [4.0K] CVE-2022-2588
└── [ 799] README.md
1 directory, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。