Discussion about this post

User's avatar
ToxSec's avatar

‘The willingness to chain multiple probabilistic steps, retrying on failure, is what makes the full exploit chain possible.’

this is a great callout here. most of the time the really juicy exploits are chained. and when you go probabilistic, you get some really interesting results.

nice read thanks for the technical breakdown.

wiz kernel's avatar

tried to execute it locally on both mitigation-v4-6.6 and cos-109-17800.519.4 and it stuck on pages_order2_read_primitive_build , any idea why ? is the race failing?

It also seems that the exploit does not have a 100% success rate as stated in the "stability_notes". Most of the time it causes a kernel NULL pointer dereference bug, which contradicts what you said in your blog - that it can be deterministic.

No posts

Ready for more?