Join GitHub today
GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Sign up
Add AF_PACKET packet_set_ring Privilege Escalation exploit #9947
Add AF_PACKET packet_set_ring Privilege Escalation exploit.
I'm testing this on Ubuntu with 4.8.0-45-generic. It seems to flip flop between working and not creating a session. e.g on the same session, it will first fail, then succeed, then fail.
After a while it seems to always fail with no output from cmd_exec
Sounds about right.
The exploit messes with the heap. Running a kernel exploit multiple times is playing with fire and increasing your chances of freezing the system. No doubt the process hung because you're executing the exploit like a mad man.
Do you have the same issue if you run it, get a new root session, kill the new root session, chill out for a minute, then run it again?
Does the exploit usually work for your on the first run? Have you managed to get a system freeze on the first run? I only ever got system freezes when I was hammering at the system.
I could introduce an artificial delay between exploit attempts to force users to chill out, but that seems far more likely to hinder exploitation than ever offer any real benefit.
Why would you execute a kernel exploit, again, immediately after it grants you a root shell?
Apologies for being pedantic. I've sent: bcoles#5
I'm running into an issue when using