Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-2588

Description

It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.

POC

Reference

- https://ubuntu.com/security/notices/USN-5560-1

- https://ubuntu.com/security/notices/USN-5560-2

- https://ubuntu.com/security/notices/USN-5562-1

- https://ubuntu.com/security/notices/USN-5564-1

- https://ubuntu.com/security/notices/USN-5565-1

- https://ubuntu.com/security/notices/USN-5566-1

- https://ubuntu.com/security/notices/USN-5582-1

- https://www.openwall.com/lists/oss-security/2022/08/09/6

Github

- https://github.com/0xMarcio/cve

- https://github.com/20142995/sectool

- https://github.com/ARGOeu-Metrics/secmon-probes

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ASkyeye/2022-LPE-UAF

- https://github.com/AlienTec1908/Blackhat2_HackMyVM_Medium

- https://github.com/Andromeda254/cve

- https://github.com/BassamGraini/CVE-2022-2588

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/EGI-Federation/SVG-advisories

- https://github.com/Etoile1024/Pentest-Common-Knowledge

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/GhostTroops/TOP

- https://github.com/Ha0-Y/LinuxKernelExploits

- https://github.com/Ha0-Y/kernel-exploit-cve

- https://github.com/HaxorSecInfec/autoroot.sh

- https://github.com/Igr1s-red/CVE-2022-2588

- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits

- https://github.com/Markakd/CVE-2022-2588

- https://github.com/Markakd/DirtyCred

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/PolymorphicOpcode/CVE-2022-2588

- https://github.com/PsychoH4x0r/Unknown1337-Auto-Root-

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Snoopy-Sec/Localroot-ALL-CVE

- https://github.com/WhooAmii/POC_to_review

- https://github.com/XinLiu2025/openkylinsat

- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits

- https://github.com/beruangsalju/LocalPrivilegeEscalation

- https://github.com/bsauce/kernel-exploit-factory

- https://github.com/bsauce/kernel-security-learning

- https://github.com/chorankates/Photobomb

- https://github.com/cleverg0d/CVEs

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/dom4570/CVE-2022-2588

- https://github.com/felixfu59/kernel-hack

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/gglessner/Rocky

- https://github.com/hktalent/TOP

- https://github.com/iandrade87br/OSCP

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/konoha279/2022-LPE-UAF

- https://github.com/ldrx30/LinuxKernelExploits

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/manas3c/CVE-POC

- https://github.com/manoj3768/OSCP

- https://github.com/nisadevi11/Localroot-ALL-CVE

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nopgadget/CVE-2022-2588

- https://github.com/personaone/OSCP

- https://github.com/pirenga/2022-LPE-UAF

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/pranjalsharma03/OSCP

- https://github.com/promise2k/OSCP

- https://github.com/sumin-world/linux-kernel-exploits

- https://github.com/talent-x90c/cve_list

- https://github.com/veritas501/CVE-2022-2588

- https://github.com/vlain1337/auto-lpe

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whoforget/CVE-POC

- https://github.com/x90hack/vulnerabilty_lab

- https://github.com/xsudoxx/OSCP

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve