CVE-2021-26708
HIGHLinux Kernel 5.5-5.10.12 - Local Privilege Escalation via AF_VSOCK Race Condition
Title source: llmExploitation Summary
EIP tracks 2 public exploits for CVE-2021-26708. PoCs published by jordan9001, azpema.
AI-analyzed exploit summary This repository provides a detailed technical analysis of CVE-2021-26708, a use-after-free vulnerability in the Linux kernel's vsock module. It includes a writeup explaining the root cause, patch analysis, and a proof-of-concept harness to demonstrate the vulnerability, though it lacks a full exploit.
Description
A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.
Exploits (2)
This repository provides a detailed technical analysis of CVE-2021-26708, a use-after-free vulnerability in the Linux kernel's vsock module. It includes a writeup explaining the root cause, patch analysis, and a proof-of-concept harness to demonstrate the vulnerability, though it lacks a full exploit.
This repository contains a functional exploit for CVE-2021-26708, a Linux kernel vulnerability involving use-after-free in the vsock module. The exploit leverages userfaultfd and message queue manipulation to achieve arbitrary read/write primitives, leading to privilege escalation.
References (7)
Scores
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H