Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22600 PoC — Double Free in net/packet/af_packet.c leading to priviledge escalation

Source
Associated Vulnerability
Title:Double Free in net/packet/af_packet.c leading to priviledge escalation (CVE-2021-22600)
Description:A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
Readme
## CVE-2021-22600 DirtyPagetable ##

This project aims to exploit a well-know kernel linux CVE-2021-22600 with DirtyPagetable technique.  


Author: Telmo Sendino


This project is part of my final thesis in the UPV/EHU university for the Computer Engineering degree. Only for educational purposes. 
File Snapshot

[4.0K] /data/pocs/b2783099f193b08aca2dd416bde3153d965cb421 ├── [4.4K] exploit_baseline.c ├── [7.0K] exploit_cc_con_side_channel.c ├── [5.3K] exploit_cc_sin_side_channel.c ├── [7.6K] exploit_slubstick_formal.c ├── [8.1K] exploit_slubstick_formal_v2.c ├── [4.0K] include │   ├── [ 499] env.h │   ├── [ 489] exploit.h │   ├── [ 687] pte_spray.h │   ├── [ 788] signalfd_spray.h │   ├── [ 632] util.h │   └── [ 454] xattr_spray.h ├── [ 300] README.md └── [4.0K] src ├── [ 133] compilate.sh ├── [3.3K] env.c ├── [4.4K] exploit.c ├── [ 237] main.c ├── [5.6K] pte_spray.c ├── [ 132] run.sh ├── [7.0K] signalfd_spray.c ├── [ 30K] test ├── [6.2K] util.c └── [3.6K] xattr_spray.c 2 directories, 22 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →