Notselwyn / CVE-2024-1086

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
https://pwning.tech/nftables
MIT License
2.27k stars 297 forks source link

The exploit freezes at a certain stage #18

Open WebMeisterX opened 4 months ago

WebMeisterX commented 4 months ago
./exploit 
[*] creating user namespace (CLONE_NEWUSER)...
[*] creating network namespace (CLONE_NEWNET)...
[*] setting up UID namespace...
[*] configuring localhost in namespace...
[*] setting up nftables...
[+] running normal privesc
[*] waiting for the calm before the storm...
[*] sending double free buffer packet...
[*] spraying 16000 pte's...

Hello. At this stage, the exploit stops, and then the system crashes. what could it be? Ubuntu kernel version 6.1

Gfquetnvl32 commented 3 weeks ago

./exploit [*] creating user namespace (CLONE_NEWUSER)...

At this stage, the exploit stops CentOS Linux release 8.5.2111

Dusker-H commented 3 weeks ago

In the 6.2 kernel version, the exploitation stops the same, the system crashes, or sometimes the exploitation succeeds normally. Why is that?